Hit papers significantly outperform the citation benchmark for their cohort. A paper qualifies
if it has ≥500 total citations, achieves ≥1.5× the top-1% citation threshold for papers in the
same subfield and year (this is the minimum needed to enter the top 1%, not the average
within it), or reaches the top citation threshold in at least one of its specific research
topics.
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
2017349 citationsEun‐Jun Yoon, Kee-Young Yoo et al.profile →
Peers — A (Enhanced Table)
Peers by citation overlap · career bar shows stage (early→late)
cites ·
hero ref
This map shows the geographic impact of Eun‐Jun Yoon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Eun‐Jun Yoon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Eun‐Jun Yoon more than expected).
This network shows the impact of papers produced by Eun‐Jun Yoon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Eun‐Jun Yoon. The network helps show where Eun‐Jun Yoon may publish in the future.
Co-authorship network of co-authors of Eun‐Jun Yoon
This figure shows the co-authorship network connecting the top 25 collaborators of Eun‐Jun Yoon.
A scholar is included among the top collaborators of Eun‐Jun Yoon based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Eun‐Jun Yoon. Eun‐Jun Yoon is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Yoon, Eun‐Jun, et al.. (2013). An Escrow-Free Two-party Identity-based Key Agreement Protocol without Using Pairings for Distinct PKGs. IEIE Transactions on Smart Processing and Computing. 2(3). 168–175.3 indexed citations
3.
Lee, Sung-Woon, et al.. (2013). Cryptanalysis and Remedy of Two-Party Identity-based Authenticated Key Agreement Protocol. 한국통신학회 학술대회논문집. 120–121.
4.
Yoon, Eun‐Jun, et al.. (2012). An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices. IEIE Transactions on Smart Processing and Computing. 1(1). 65–71.3 indexed citations
5.
Yoon, Eun‐Jun, et al.. (2012). DE-Based Adaptive Reversible Data Hiding Scheme. Journal of the Institute of Electronics Engineers of Korea. 49(2). 103–114.
6.
Yoon, Eun‐Jun, et al.. (2012). Cryptanalysis of Lo et al.'s Mutual Key Agreement Protocol for Mobile RFID-Enabled Devices. 대한전자공학회 학술대회. 1965–1968.1 indexed citations
7.
Yoon, Eun‐Jun, et al.. (2012). Cryptanalysis of Flyweight RFID Authentication Protocol. 대한전자공학회 학술대회. 1969–1972.1 indexed citations
Yoon, Eun‐Jun & Kee-Young Yoo. (2010). Patient Authentication System for Medical Information Security using RFID. The Journal of Korean Institute of Communications and Information Sciences. 35. 962–969.2 indexed citations
10.
Yoon, Eun‐Jun, et al.. (2010). A Storage and Computation Efficient RFID Distance Bounding Protocol. The Journal of Korean Institute of Communications and Information Sciences. 35. 1350–1359.
11.
Yoon, Eun‐Jun, et al.. (2010). Intelligence E- Learning System. The Journal of the Institute of Webcasting, Internet and Telecommunication. 10(1). 137–144.
12.
Yoon, Eun‐Jun, et al.. (2009). Improved Authentication Protocol for RFID/USN Environment. Journal of the Institute of Electronics Engineers of Korea. 46(1). 1–10.2 indexed citations
13.
Yoon, Eun‐Jun & Kee-Young Yoo. (2009). A Design of RFID Mutual Authentication System based on Open Channel. The Journal of Korean Institute of Communications and Information Sciences. 34. 946–954.
14.
Yoon, Eun‐Jun, et al.. (2009). Secret Sharing Scheme using Gray Code based on Steganography. Journal of the Institute of Electronics Engineers of Korea. 46(1). 96–102.3 indexed citations
Yoon, Eun‐Jun & Kee-Young Yoo. (2006). A Forgery Attack on A Low Computation Cost User Authentication Scheme.. International journal of network security. 3. 51–53.3 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.