Smart contract-based review system for an IoT data marketplace JS Park, TY Youn, HB Kim, KH Rhee, SU Shin Sensors 18 (10), 3577, 2018 | 102 | 2018 |
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks TY Youn, YH Park, J Lim IEEE Communications Letters 13 (7), 471-473, 2009 | 83 | 2009 |
Public key encryption with equality test in the standard model HT Lee, S Ling, JH Seo, H Wang, TY Youn Information Sciences 516, 89-108, 2020 | 62 | 2020 |
Can id shuffling technique (cist): Moving target defense strategy for protecting in-vehicle can S Woo, D Moon, TY Youn, Y Lee, Y Kim IEEE Access 7, 15521-15536, 2019 | 50 | 2019 |
Efficient client-side deduplication of encrypted data with public auditing in cloud storage TY Youn, KY Chang, KH Rhee, SU Shin IEEE Access 6, 26578-26587, 2018 | 42 | 2018 |
Method and device to assist in the execution of tasks of parallel jobs QA Tran, M Xu US Patent 7,111,299, 2006 | 39 | 2006 |
Blockchain-based data sharing and trading model for the connected car BG Jeong, TY Youn, NS Jho, SU Shin Sensors 20 (11), 3141, 2020 | 28 | 2020 |
Improved delegation-based authentication protocol for secure roaming service with unlinkability TY Youn, J Lim IEEE Communications Letters 14 (9), 791-793, 2010 | 24 | 2010 |
Client‐Side Deduplication to Enhance Security and Reduce Communication Costs K Kim, TY Youn, NS Jho, KY Chang Etri Journal 39 (1), 116-123, 2017 | 23 | 2017 |
Semi-generic transformation of revocable hierarchical identity-based encryption and its DBDH instantiation K Emura, JH Seo, TY Youn IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016 | 23 | 2016 |
Efficient three-party key exchange protocols with round efficiency TY Youn, ES Kang, C Lee Telecommunication Systems 52, 1367-1376, 2013 | 17 | 2013 |
System and method for providing compressed encryption and decryption in homomorphic encryption based on integers TY Youn, NS Jho, JY Hwang, KY Chang US Patent 9,374,220, 2016 | 16 | 2016 |
An efficient public key cryptosystem with a privacy enhanced double decryption mechanism TY Youn, YH Park, CH Kim, J Lim International Workshop on Selected Areas in Cryptography, 144-158, 2005 | 15 | 2005 |
Practical sender authentication scheme for in-vehicle CAN with efficient key management TY Youn, Y Lee, S Woo IEEE Access 8, 86836-86849, 2020 | 14 | 2020 |
Method and system for additive homomorphic encryption scheme with operation error detection functionality TY Youn, N Jho, KY Chang US Patent 10,270,588, 2019 | 14* | 2019 |
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes TY Youn, C Lee, YH Park Computer Communications 34 (3), 353-357, 2011 | 14 | 2011 |
Security analysis of an unlinkable secret handshakes scheme TY Youn, YH Park IEEE communications letters 14 (1), 4-5, 2009 | 14 | 2009 |
Authorized client-side deduplication using CP-ABE in cloud storage TY Youn, NS Jho, KH Rhee, SU Shin Wireless Communications and Mobile Computing 2019, 2019 | 10 | 2019 |
Signcryption with fast online signing and short signcryptext for secure and private mobile communication TY Youn, D Hong Science China Information Sciences 55, 2530-2541, 2012 | 10 | 2012 |
Weakness in a RSA-based password authenticated key exchange protocol TY Youn, YH Park, C Kim, J Lim Information processing letters 108 (6), 339-342, 2008 | 10 | 2008 |