메뉴 건너뛰기

Welcome to ISG

NumberTitleAuthorProceedingPageDate
235Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health CareJongho Moon, Hyungkyu Yang, Youngsook Lee, Dongho WonACM IMCOM 2017, Beppu, Japan1-82017.01.04
234Cryptanalysis and Improvement of Robust Authentication Scheme for Telecare Medicine Information SystemsDongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, Dongho WonACM IMCOM 2017, Beppu, Japan1-82017.01.04
233Cryptanalysis and Improvement of a Biometric and Smart Card Based Remote User Authentication SchemeChunyi Quan, Jaewook Jung, Jiye Kim, Qimin Sun, Donghoon Lee, Dongho WonACM IMCOM 2017, Beppu, Japan1-82017.01.04
232An Enhanced Unlinkable Anonymous Payment Scheme Based on Near Field CommnicationHakjun Lee, Jiye Kim, Jaewook Jung, Youngsook Lee, Dongho WonACM IMCOM 2017, Beppu, Japan1-82017.01.04
231A Security Enhanced Lightweight Mobile Payment Scheme Based on Two GatewaysHakjun Lee, Jiye Kim, Jongho Moon, Dongwoo Kang, and Dongho Won2016 2nd International Conference on Systems, Control and Communications Bangkok, Thailand2016.12.16
230Security Enhanced Anonymous User Authenticated Key Agreement Scheme using Smart CardJaewook Jung, Donghoon Lee, Hakjun Lee, and Dongho Won2016 2nd International Conference on Systems, Control and Communications Bangkok, Thailand2016.12.16
229Software Birthmark Method Using Combined Structure–based and API–basedDonghoon Lee, Dongwoo Kang, Jiye Kim, and Dongho Won2016 2nd International Conference on Systems, Control and Communications Bangkok, Thailand2016.12.16
228Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server EnvironmentJongho Moon, Jiye Kim, Donghoon Lee, Dongho Won2016 4th Intl Conf on Applied Computing and Information Technology, Las Vegas, USA14-192016.12.13
227Public Key-based Session Key Establishment for Hierarchical Sensor NetworksJiye Kim, Jongho Moon, Jaewook Jung, Donghoon Lee, Youngsook Lee, and Dongho WonThe 9th International Conference on Security Technology (SecTech 2016), Jeju Isalnd, Korea2016.11.24
226Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile NetworksYoungseok Chung, Seokjin Choi and Dongho WonICCSA 2016, Beijing, China, LNCS 9789289-3012016.07.04
225Cryptanalysis and Improvement User Authentication Scheme for Multi-server EnvironmentDongwoo Kang, Jongho Moon, Donghoon Lee and Dongho WonICCSA 2016, Beijing, China, LNCS 979087-992016.07.04
224An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server EnvironmentQimin Sun, Jongho Moon, Younsung Choi and Dongho WonGPC 2016 (Xian) Springer, LNCS 9663229-2422016.05.07
223Cryptanalysis of Smart Card Based Remote User Authentication Scheme for Multi-Server EnvironmentQimin Sun, Jongho Moon, Younsung Choi and Dongho WonICIAE 2016, Beppu, Japan1-62016.03.26
222Security Analysis of user Authentication and Key Establishmenet scheme for WSNs in IoT ApplicationsJiye Kim, Dongwoo Kang and Dongho WonICESI 2016, Jeju Isalnd, Korea172-1752016.03.23
221Security analysis of an enhanced biometric-based three factors user authentication scheme for multi-server environmentsJongho Moon, Jiseon Yu, Qimin Sun and Dongho WonICESI 2016, Jeju Isalnd, Korea165-1682016.03.23
220Secure authenticaion and key agreement scheme preserving user anonymity in mobile networksYoungseok Chung, Youngsook Lee and Dongho WonICESI 2016, Jeju Isalnd, Korea180-1832016.03.23
219Improvement of biometrics and smart cards-based authentication scheme for multi-server environmentsJongho Moon, Jiseon Yu, Hyungkyu Yang and Dongho WonACM IMCOM 2016, Danang, Vietnam1-82016.01.
218Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash FunctionJaewook Jung, Donghoon Lee, Jiye Kim, Dongwoo Kang, Youngsook Lee and Dongho Won ACM IMCOM 2016, Danang, Vietnam1-82016.01.
217Securty Analysis of Mobile Authentication using QR-CodesSiwon Sung, Joonghwan Lee, Jinmok Kim, Jongho Mun and Dongho WonSeventh International Conference on Networks & Communications, Sydney, Australia151-1602015.12.26
216Cryptanalysis on Symmetric Key Techniques based Authentication Scheme for Wireless Sensor NetworksYounsung Choi, Youngsook Lee and Dongho WonCSA 2015 (Cebu) Springer, LNEE 3737-132015.12.15
215Cryptanalysis of Dynamic ID-based User Authentication Scheme using Smartcards without Verifier TablesJaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, Jongho Mun and Dongho WonCSA 2015 (Cebu) Springer, LNEE 37345-512015.12.15
214Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve CryptosystemJongho Mun, Jiseon Yu, Jiye Kim, Hyungkyu Yang and Dongho WonCSA 2015 (Cebu) Springer, LNEE 3731-62015.12.15
213Secure Deletion for Flash-Based Self-Encrypting DrivesHanwook Lee, Jongho Mun, Jiye Kim, Youngsook Lee and Dongho WonCUTE 2015 (Cebu) Springer, LNEE 373559-5662015.12.15
212Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous DevicesDongwoo Kang, Jongho Mun, Donghoon Lee and Dongho WonCUTE 2015 (Cebu) Springer, LNEE 373309-3152015.12.15
211An Improvement of User Authentication Framework for Cloud ComputingJongho Mun, Jiye Kim, and Dongho WonICCTD2015, No. 7, Singapore1-92015.11.16
210Cryptanalysis of Biometric-based Multi-server Authentication Scheme Using Smart CardJongho Mun, Jiye Kim, Donghoon Lee and Dongho WonQSHINE 2015, No. 11, Taipei, Taiwan56-592015.08.
209Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor NetworksYounsung Choi, Junghyun Nam, Youngsook Lee, Seyoun Jung, and Dongho WonInforTech 2015, Computer Science and its Applications, Lecture Notes in Electrical Engineering, Vol. 330, Taipei, Taiwan1367-13752015.08.
208An Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier TablesJongho Mun, Jiye Kim, Donghoon Lee, Jaewook Jung, Younsung Choi, and Dongho WonWORLDCOMP 15, Las Vegas, Nevada, USA152-1562015.07.27
207Statistical Analysis Between Malware and Benign Based on IA-32 InstructionDongwoo Kang, Donghoon Lee, Jaewook Jung, and Dongho WonProceedings of the The Fourth International Conference on Informatics & Applications, Takamatsu, Japan, 201532-422015.07.
206Security Improvement of Portable Key Management using a Mobile phoneJiye Kim, Donghoon Lee, Younsung Choi, Youngsook Lee, and Dongho WonComputational Science and Its Applications--ICCSA 2015. Springer International Publishing (LNCS), Banff, Alberta, Canada148-1592015.06.08
205A novel smart card-based remote user authentication mechanismDeborah Uwera and Dongho WonSICEAS 2015, No. 183, Seoul, South Korea197-1992015.01.
204Password-Based Single-File Encryption and Secure Data Deletion for Solid-State DriveYounsung Choi, Donghoon Lee, Woongryul Jeon, Dongho WonICUIMC 2014, Siem Reap, Cambodia, January 09-112014.
203An Enhanced Remote User Authentication Scheme Using Smart Card Jaewook Jung, Woongryul Jeon, Dongho WonICUIMC 2014, Siem Reap, Cambodia, January 09-112014.
202Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function Youngil Kim, Younsung Choi, Dongho WonICISA 2014, IEEE computer society, Seoul, Korea252-2552014.
201Security Analysis of a Delegation-Based Authentication Protocol for Wireless Roaming Service Mijin Kim, Namje Park, Dongho WonMUE 2014, LNEE 308, Zhangjiajie, China445-4502014.
200An Improvement of Encrypted Remote User Authentication Scheme by Using Smart CardJongho Mun, Jiye Kim, Woongryul Jeon, Youngsook Lee, and Dongho WonMUE 2014, LNEE 308, Zhangjiajie, China451-458.2014.
199Countermeasure on Password-Based Authentication Scheme for Multi-server EnvironmentsYoungsook Lee, Jiye Kim, and Dongho WonMUE 2014, LNEE 308, Zhangjiajie, China459-4662014.
198Cryptanalysis of Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia SystemYounsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Dongho WonDigitalSec 2014, The Society of Digital Information and Wireless Communications, Ostrava, Czech46-552014.
197An Improvement of Secure Remote User Authentication Scheme using Smart CardsJongho Mun, Qiuyan Jin, Woongryul Jeon, Dongho WonICITCS 2013, Macau, China1-42013.12.
196A Secure User-friendly Authentication Scheme with Anonymity for Wireless CommunicationsWoongryul Jeon, Yunho Lee, Dongho WonICUIMC 2013, Volume 37 Number 3, Kota Kinabalu,, Malaysia, January17-192013.
195On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange ProtocolYoungsook Lee and Dongho WonGPC 2013 Springer Verlag LNCS 7861730-7362013.
194Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks Youngseok Chung, Youngsook Lee and Dongho WonGPC 2013 Springer Verlag LNCS 7861752-7602013.
193Cryptanalysis of an authenticated group key transfer protocol based on secret sharingMijin Kim, Namje Park, and Dongho WonGPC 2013 Springer Verlag LNCS 7861761-7662013.
192Security Requirement of End Point Security SoftwareHyun-Jung Lee, Youngsook Lee and Dongho WonGPC 2013 Springer Verlag LNCS 7861788-7952013.
191Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap SystemInkyung Jean, Youngsook Lee and Dongho WonGPC 2013 Springer Verlag LNCS 7861796-8022013.
190Improvement of a Chaotic Map Based Key Agreement Protocol that Preserves AnonymityHyunsik Yang, Jin Qiuyan,Hanwook Lee Kwangwoo Lee, and Dongho WonGPC 2013 Springer Verlag LNCS 7861803-8102013.
189A Design of Real-time Restriction System based on User’s Behavior in the Online GameDonghoon Lee, Woongryul Jeon, Hanwook Lee, and Dongho WonResearch Notes in Information Science 2013(RNIS 2013), Jeju island, Korea352-3542013.
188Fingerprint-based User Authentication Scheme for Home Healthcare systemQiuyan Jin, Woongryul Jeon, Changwhan Lee ,Youngchul Choi, Dongho WonThe Fifth International Conference on Ubiquitous and Future Networks ICUFN 2013178-1832013.
187High-Level Design for a Secure Mobile Device Management SystemKeunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, and Dongho WonSpringer Berlin Heidelberg, LNCS 8030348-3562013.
186Security Analysis on a Group Key Transfer Protocol Based on Secret SharingMijin Kim, Namje Park, and Dongho WonMUSIC 2013, LNEE 274, Springer Gwangju, Korea483-4882013.
185Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility NetworksYoungseok Chung, Seokjin Choi, Youngsook Lee, and Dongho WonMUSIC 2013, LNEE 274, Springer Gwangju, Korea535-5402013.
184Protection Profile for PoS (Point of Sale) System Hyun-Jung Lee Youngsook Lee and Dongho WonMUSIC 2013, LNEE 274, Springer Gwangju, Korea495-5002013.
183Scalable Key Management for Dynamic Group in Multi-cast Communication Fikadu B.Degefa, and Dongho WonMUSIC 2013, LNEE 274, Springer Gwangju, Korea521-5272013.
182 Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart CardJongho Mun, Jiye Kim, WoongryulJeon, Youngsook Lee, Dongho WonCSA-13, LNEE 279, Springer Danang, Vietnam423-4282013.
181Security Controls based on K-ISMS in Cloud Computing ServiceJongho Mun, Youngman Jung, Jeeyeon Kim, Youngsook Lee, Kidam Park, Dongho WonCSA-13, LNEE 279, Springer Danang, Vietnam391-4042013.
180Improved Delegation-Based Mobile Authentication Protocol for Wireless Roaming ServiceMijin Kim, Namje Park, Dongho WonUCES-13, Danang, Vietnam2013.
179Key Management Scheme using Dynamic Identity-Based Broadcast Encryption for Social Network Services Youngman Jung, Yoonho Nam, Jiye Kim, WoongryulJeon, Hanwook Lee, Dongho WonCSA-13, LNEE 279, Springer Danang, Vietnam435-4432013.
178Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key Agreement Mijin Kim, Namje Park, and Dongho Won CSA 2012 (Jeju) Springer, LNEE 203687-6922012.12.
177Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service SystemNamje Park, Seunghyun Cho, Byung-Doo Kim, Byunggil Lee, and Dongho WonCSA 2012 (Jeju) Springer, LNEE 203699-7052012.12.
176Experimentation and Validation of Web Application's Vulnerability Using Security Testing Method Taeseung Lee, Giyoun Won Seongje Cho, Namje Park, and Dongho WonCSA 2012 (Jeju) Springer, LNEE 203723-7312012.12.
175A Practical Study on Advanced Persistent ThreatsInkyung Jeon, Yoongsook Lee, Dongho WonSecTech 2012 (Jeju) Springer, CCIS 339144-1522012.11.28
174Security Issues and Threats According to the Attribute of Cloud ComputingHyangjin Lee, Jeeyeon Kim, Youngsook Lee, and Dongho WonSecTech 2012 (Jeju) Springer, CCIS 339101-1082012.11.28
173Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Muli-server EnvironmentMijin Kim, Namje Park, and Dongho Won SecTech 2012 (Jeju) Springer, CCIS 339122-1272012.11.
172Design of a Simple User Authentication Scheme Using OR-Code for Mobile Device Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, and Dongho WonSTA 2012, Gwangju, Korea, LNEE 180241-2472012.09.06
171Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server EnvironmentMijin Kim, Namje Park, and Dongho WonSTA 2012, Gwangju, Korea, LNEE 180233-2402012.09.06
170Security Analysis of Authentication Scheme for Wireless communications with User Anonymity Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, and Dongho WonSTA 2012, Gwangju, Korea, LNEE 180225-2312012.09.06
169A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques이창환, 양현식, 이병희, 원동호ICHIT 2012, LNCS 7425608-6172012.08.23
168A Study on method to analyze application on bada using GUI without source code Hanjae Jeong, Dongho WonASIAJCIS 2012, Tokyo, Japan, August 09 -10, 2012702012.08.09
167Security Analysis on Password-based Authentication Scheme for Multi-Sever Environments이영숙, 김지연, 원동호CNSI 2012 ASTL, Vol. 897-1012012.07.16
166A Survey of Web Search Engines백주련, 남정현, 김응모, 원동호CNSI 2012 ASTL, Vol. 8155-1592012.07.16
165Valuable Association Rules Extraction from XML-Based Tree Data 백주련, 남정현, 김응모, 원동호CNSI 2012 ASTL, Vol. 8160-1632012.07.16
164Experimental Study on the Possibility of DDoS Attack in Mobile Network Kyoungju Kwak, Kwangwoo Lee and Dongho WonIAM 2012, International Conference on Innovation and Management, Koror, Palau, July 15-18, 2012372012.07.15
163Database Encryption Implementation and Analysis using Graphics Processing UnitInkyung Jeun,Hyun-Chul Jung, Nan-Ki Lee, Dongho WonThe 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC 2012), Vancouver, Canada109-1132012.06.26
162 Cryptanalysis and Improvement of a Biometrics-Based Multi-server authentication with Key Agreement SchemeHakhyun Kim, Woongryul Jeon, Kwang-Woo Lee, Yunho Lee, Dongho WonLNCS 7335. ICCSA. Bahia Brazil391-4062012.06.18
161Enhanced Password-Based User Authentication Using Smart Phone전인경, 김미진, 원동호LNCS 7296, GPC 2012361-3692012.05.13
160Security Analysis of Zhao and Gu's Key Exchange ProtocolJunghyun Nam, Juryon Paik, Dongho WonIST 2012, Shanghai, China, April 28-3043-452012.04.28
159Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile DevicesJunghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, Woongryul Jeon, Dongho WonISA 2012, Shanghai, China, April 28-3089-912012.04.28
158An Off-Line Dictionary Attack on Abdalla and Pointcheval's 3-Party Key Exchange Protocol Junghyun Nam, Jinsoo Kim, Juryon Paik, Dongho WonISA 2012, Shanghai, China, April 28-3074-762012.04.28
157Protection Profile for Mobile Device Management System Keunwoo Rhee, Woongryul Jeon and Dongho WonISA 2012, Shanghai, China, April 28-30187-1892012.04.28
156Cryptanalysis of a two-factor user authentication scheme over insecure channels Jin Qiuyan, Kwangwoo Lee, Dongho WonISA 2012, Shanghai, China, April 28-30107-1092012.04.28
155A study on method to analyze application on bada without source code Hanjae Jeong and Dongho WonIST 2012, April 28-30203-2052012.04.28
154An Efficient User Authentication Scheme for Wireless Communications Woongryul Jeon, Kwangwoo Lee, Byunghee Lee, Yunho Lee, Dongho WonASP 2012,Seoul, March 30-31, 2012872012.03.30
153A Practical and Secure Remote User Authentication Scheme Using Smart CardsQiuyan Jin , Kwangwoo Lee, and Dongho WonASP 2012,Seoul, March 30-31, 2012892012.03.30
152A Method for Secure and Efficient Block Cipher using White-Box, CryptographyJaesung Yoo, Hanjae Jeong, and Dongho WonICUIMC, February 20-2217-2012.02.20
151On the Security of a Novel Protocol for Downloadable CASHanjae Jeong, Seungjoo Kim and Dongho WonICUIMC, February 20-2215-2012.02.20
150Privacy-enhanced social network service (SNS) Hanjae Jeong, Changbin Lee, Jin Kwak, Dongho Won Changyoung Kwon, Seungjoo KimFTRA WCC-ACSA 2011, December 12-152011.12.12
149A Study on the Secure Home Healthcare Wireless ServiceChangwhan Lee, Dongho Won Namje ParkFGIT 2011, LNCS 7105277-2842011.12.07
148An Improved Anonymous Electronic Prescription Scheme Chanjoo Chung, Kwangwoo Lee, Jungmee Yun, and Dongho WonFGIT 2011, LNCS 7105293-3002011.12.07
147Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable FileDonghwi Shin, Kwangwoo Lee, and Dongho WonFGIT 2011, LNCS 7105301-3082011.12.07
146Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing Junghyun Nam, Moonseong Kim, Juryon Paik, Woongryul Jeon, Byunghee Lee, and Dongho WonFGIT 2011, LNCS 7105309-3152011.12.07
145Protection Profile for Data Leakage Protection System Hyun-Jung Lee and Dongho WonFGIT 2011, LNCS 7105316-3262011.12.07
144Security Analysis on Digital Signature Function Implemented in PDF SoftwareSunwoo Park, Changbin Lee, Kwangwoo Lee, Jeeyeon Kim, Youngsook Lee, and Dongho WonFGIT 2011, LNCS 7105327-3342011.12.07
143Information Technology Security Evaluation Using CERT C Secure Coding Standard Taeseung Lee, Kwangwoo Lee, Dongho Won and Namje ParkFGIT 2011, LNCS 7105335-3422011.12.07
142USN Middleware Access Control of Sensor Network and Selective Encryption of InformationTaeseung Lee, Dongho Won and Namje ParkFGIT 2011, LNCS 7105343-3522011.12.07
141Enhanced Code-Signing Scheme for Smartphone ApplicationsInkyung Jeun, Kwangwoo Lee, and Dongho WonFGIT 2011, LNCS 7105353-3602011.12.07
140Cryptanalysis of the User Authentication Scheme with Anonymity Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho WonFGIT 2011, LNCS 7105285-2922011.12.
139Protection Profile of Personal Information Security SystemHyun-Jung Lee, Kwangwoo Lee, Dongho WonProc. of IEEE SPIoT 2011, The 2011 IEEE International Workshop on Security and Privacy in Internet of Things, Changsha, China2011.11.16
138An Improved Protection Profile for Multifunction Peripherals in Consideration of Network Separation 이창빈, 이광우, 박남제, 원동호ITCS Springer Verlag, LNEE 107211-2192011.10.20
137An Improved User Authentication Scheme for Wireless Communications전웅렬, 김지연, 남정현, 이영숙, 원동호ITCS Springer Verlag, LNEE 107203-2102011.10.20
136Construction of a Privacy Preserving Mobile Social Networking Service정재욱, 김학현, 유재성, 이창빈, 김승주, 원동호ITCS Springer Verlag, LNEE 107251-2612011.10.20
135A Study on the Development of Security Evaluation Methodology for Wireless Equipment박남제, 이창빈, 이광우, 원동호ITCS Springer Verlag, LNEE 107231-2392011.10.20
134Security Improvement to a Authentication Scheme for Session Initiation Protocol이영숙, 김지연, 남정현, 원동호ITCS Springer Verlag, LNEE 107221-2302011.10.20
133A Security Weakness in Tseng et al Key Agreement Protocol Hyunsik Yang, Kwangwoo Lee, Changbin Lee, Jin Kwak, Dongho WonProc. of JWIS 2011, The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan32. e-file (10p)2011.10.05
132Security Analysis of Smartphone Music Streaming Services Huiseung Jeon, Kwangwoo Lee, Changbin Lee, Dongho WonProc. of JWIS 2011, The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan26. e-file (10p)2011.10.05
131A Mobile based Anti-Phishing Authentication Scheme using QR code Kyeongwon Choi, Changbin Lee, Woongryul Jeon, Kwangwoo Lee and Dongho WonICMIC 2011, September 26-28109-1132011.09.26
130An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard Changbin Lee,Kwangwoo Lee, Dongho WonICHIT LNCS 6935488-4952011.09.22
129Malware Variant Detection and Classification Using Control Flow GraphDonghwi Shin, Dongho WonICHIT Springer Verlag CCIS 206174-1812011.09.22
128An Authenticated Key Exchange to improve the Security.of Shi et al.and Kim et al.'s Protocols김미진, 권창영, 원동호Proc. of WISM 2011, Springer-Verlag, LNCS 6987, Taiyuan, China259-2702011.09.
127Cryptanalysis of Robust Multi-Server Authentication Scheme Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho WonProc. of CCSIE 2011, London216-2192011.07.25
126Study of Information Security Pre-Diagnosis Model for New IT Services Wanseok Yi, Kwangwoo Lee, Jin Kwak, and Dongho WonProc. of WORLDCOMP 2011, July 18-21, 2011, Las Vegas2011.07.18
125Cryptanalysis to a Remote User Authentication Sever Using Smart Cards for Multi-Sever Enviroment이영숙, 김지연, 원동호HCII 2011 LNCS 6771321-3292011.07.09
124Analysis of Content Filtering Software전웅렬, 이영숙, 원동호HCII 2011 LNCS 6771548-5572011.07.09
123A Practical Analysis of Smartphone Security전웅렬, 김지연, 이영숙, 원동호HCII 2011 LNCS 6771311-3202011.07.09
122Server-Aided Password-Authenticated Key Exchange: From 3-Party to GroupJunghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, and Dongho WonHCII 2011, LNCS 6771, Orlando, USA, July 09-14, 2011,339-3482011.07.09
121Security Improvement on a Group Key Exchange Protocol for Mobile Networks남정현, 이광우, 백주련, 박우진, 원동호ICCSA 2011 NCS 6785123-1322011.06.20
120An Improved Protocol for Server-Aided Authenticated Group Key Establishment남정현, 백주련, 이병희, 이광우, 원동호ICCSA 2011 NCS 6785437-4462011.06.20
119An Improved Key Establishment Scheme for Wireless Sensor NetworkJaesung Yoo, Yunho Lee, Dongho Won CFI 2011, Seoul, Korea70-712011.06.13
118Analysis on Vulnerability of Home Healthcare Medical Devices and Development of Protection Profile based on Common Criteria Version 3.1Changwhan Lee, Kwangwoo Lee, Seungjoo Kim and Dongho WonProc. of CNSI 2011240-2472011.05.23
117An Analysis of Multi-Function Peripheral with a Digital Forensics PerspectiveKwangwoo Lee, Changbin Lee, Namje Park, Seungjoo Kim and Dongho WonProc. of CNSI 2011252-2572011.05.23
116Analysis and Countermeasures of Security Vulnerability on Portal SitesKyoungju Kwak, Kwangwoo Lee, Dongho Won and Seungjoo KimProc. of ICUIMC 20112-52011.02.28
115An Exquisite Authentication Scheme with Key Agreement Preserving User AnonymityMijin Kim, Seungjoo Kim, and Dongho WonSpringer-Verlag, LNCS 6318244-2532010.10.
114Automated DCI Compliance Test System for Digital Cinema EntitiesTaehyun Kim, Dongho Won, Kwangwoo Lee, Hogab Kang, Seungjoo KimProc. of IEEE NCM 2010434-4392010.08.16
113A Secure Key Management Scheme for Multi-Agent base Sensor Cloud Computing in Wireless NetworkDongbum Lee, Kwangwoo Lee, Seungjoo Kim, Woong Go, Dongho Won, Jin KwakThe 5th Joint Workshop on Information Security272-2862010.08.05
112A Trustworthy ID Management Mechanism in Open MarketInkyung Jeun and Dongho WonISPEC Lecture Note in Computer Science 6047229-2402010.05.12
111Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart CardsYoungsook Lee, Hyungkyu Yang, and Dongho WonISPEC Lecture Note in Computer Science 6047377-3852010.05.12
110A proposal of appropriate evaluation scheme for exchangeable CAS(XCAS)Yu-na Hwang, Hanjae Jeong, Sungkyu, Cho, Dongho Won and Seungjoo KimISPEC Lecture Note in Computer Science 6047217-2282010.05.12
109Protection Profile for Secure E-Voting SystemsKwangwoo Lee, Yunho Lee, Dongho Won and Seungjoo KimISPEC Lecture Note in Computer Science 6047388-3972010.05.12
108A Study on Comparative Analysis of the Information Security Management Systems Heasuk Jo, Seungjoo Kim, and Dongho WonICCSA2010, LNCS 6019510-5192010.03.23
107Security Analysis on Commercial Online Music Streaming Service and ountermeasures Sangshik Lee, Donghyun Choi, dongho Won Seungjoo KimICUIMC 2010, Sungkyunkwan University BK 21408-4142010.01.15
106Weakness and Improvements of Kuo-Lee's One-time Password Authentication Scheme Mijin Kim, Byunghee Lee, Seungjoo Kim, and Dongho Wonccis springer421-4302009.12.12
105Security analysis of two-factor authenticated key exchange protocol in Public Wireless LANsHyunseung Lee, Donghyun Choi, Yunho Lee, Dongho Won Seungjoo KimInternational Conference on Computer Networks and security (ICCNS 2009), Bali, Indonesia390-3932009.11.25
104Security Analysis on the Online Office and Proposal of the Evaluation CriteriaHyunsang Park, Kwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho WonInternational Conference on Computer Networks and security (ICCNS 2009), Bali, Indonesia370-3762009.11.25
103Security Analysis on Anonymous mutual authentication protocol for RFID Tag without Back-End Database and its improvementSongyi kim, Kwangwoo Lee, Seungjoo Kim, Dongho WonInternational Conference on Computer Networks and security (ICCNS 2009), Bali, Indonesia365-3692009.11.25
102A Practical approaches to Code Encryption Method against Reverse Engineering Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won, Seungjoo KimInternational Conference on Computer Networks and security (ICCNS 2009), Bali, Indonesia151-1582009.11.25
101Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won Seungjoo KimInternational Conference on Computer Networks and security (ICCNS 2009), Bali, Indonesia386-3892009.11.25
100Enhancing of a Password-Based Authentication Scheme Using Smart CardsYoungsook Lee, and Dongho WonOTM 2009, LNCS 5871879-8862009.11.01
99A Practical Approach to a Reliable Electronic ElectionKwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho WonICCSA 2009 Springer-Verlag, LNCS 5593191-2032009.06.29
98Smart card based AKE Protocol using Biometric Information in Pervasive Computing EnvironmentWansuck Yi, Seungjoo Kim, Dongho WonICCSA 2009 Springer-Verlag, LNCS 5593182-1902009.06.29
97Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-Server EnvironmentYoungsook Lee, Dongho WonICCSA 2009 Springer-Verlag, LNCS 5593164-1722009.06.22
96Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session KeyMijin Kim, Heasuk Jo, Seungjoo Kim, Dongho WonICCSA 2009 Springer-Verlag, LNCS 5593204-2112009.06.22
95Cipher Suite Setting Problem of SSL Protocl and It's SolutionYunyoung Lee, Soonhaeng Hur, Dongho Won and Seungjoo KimFINA 2009 UK140-1462009.05.26
94Security Specification for Conversion Technologies of Heterogeneous DRM SystemsJunghyun Nam, Juryon Paik, Hyun-Kyu Kang, Ung Mo Kim, and Dongho WonISPEC 2009, LNCS 5451159-1702009.04.13
93Protection Profile for Connected Interoperable DRM Framework Donghyun Choi, Sungkyu Cho, Dongho Won and Seungjoo KimWISA 2008, Lecture note in computer science 5379320-3322009.03.01
92New Identity Management Scheme and Its Formal AnalysisJeonghoon Han, Hanjae Jeong, Dongho Won Seungjoo KimICT 08 vol 37, Dubi United Arab Emirates617-6232009.01.28
91Off-line Password-guessing Attack to Yang's and Huang's Authentication SchemesHeasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho WonNCM 2009 : 5th international conference on INC, IMS, and IDC, (Seoul Korea)618-6212009.
90How to Trust DRE Voting Machines Preserving Voter Privacy Yunho Lee, Seungjoo Kim and Dongho WonICEBE 2008302-3072008.10.22
89Security Weakness in Chang and Wu‘s Key Agreement Protocol for a Multi-Server EnvironmentYoungsook Lee and Dongho WonICEBE 2008308-3142008.10.22
88Government Information Security System with ITS Product Pre-qualificationWan S.Yi, Dongbum Lee, Jin Kwak, Dongho WonJWIS 092008.08.06
87Secure Authentication Protocol with Biometrics in an M-Commerce EnvironmentWan S.Yi, Woong Go, Dongho Won Jin KwakJWIS 092008.08.06
86Multilateral Approaches to the Mobile RFID Security Problem Using Web ServiceNamje Park, Youjin Song, Dongho Won and Howon KimProc. of APWeb 2008, The 10th Asia Pacific Web Conference, Springer-Verlag, LNCS 4976331-3412008.04.26
85Enforcing Security in Mobile RFID Networks: Multilateral Approaches and Solutions Namje Park, Howon Kim, Seungjoo Kim, and Dongho WonProc. of IEEE/IFIP NOMS 2008, The 11th IEEE/IFIP Network Operations&Management999-10022008.04.07
84Policy and Role based Mobile RFID User Privacy Data Management System Namje Park, Youjin Song, and Dongho WonProc. of IEEE/IFIP NOMS 2008, The 11th IEEE/IFIP Network Operations & Management1003-10072008.04.07
83Vulnerabilities in a Remote Agent Authentication scheme Using Smart CardsYoungsook Lee, Junghyun Nam, and Dongho WonSpringer verlag, LNAI 4953850-8572008.03.26
82Vulnerability Analysis of Secure USB Flash DrivesHanjae Jeong, Younsung Choi, Woongryel Jeon, Yunho Lee, Seungjoo Kim, and Dongho WonIEEE International Workshop on Memory Technolgy, Design, and Testing61-642007.12.03
81Efficient RFID Authentication Protocol for Minimizing RFID Tag ComputationKeunwoo Rhee, Jin Kwak, Wan S.Yi, Chanho Park Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, and Dongho WonICHIT 2006, LNCS 4413607-6162007.12.
80Infringing Key Authentication of an ID-Base Group Key Exchange Protocol Using Binary Key Trees Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho WonKES 2007, LNAI 4692672-6792007.09.
79Security Analysis on the Authentication Mechanics of Korean Popular MessengersDonghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho WonHCI, LNCS 4554547-5522007.08.20
78Secure Mobile Contrnt Delivery Using Dynamic Group Key Agreement with Batch VerificationSeokhyang Cho, Kiwon Song, Dongsub Cho, Dongho WonICCSA, LNCS 4706996-10072007.08.
77An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, and Dongho WonATC 2007, LNCS 4610135-1452007.07.11
76Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting Youngsook Lee, Junghyun Nam, Jin Kwak, and Dongho WonKES international Symposium, KES-AMSTA 2007, LNAI 4496616-6252007.06.01
75A Countermeasure of Fake Root Key Installation Using One-Time Hash ChainYounggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho WonKES international Symposium, KES-AMSTA 2007 LNAI 44961007-10162007.06.01
74Constant-Round Authenticated Group Key Exchange with Logarithmic Computation ComplexityJunghyun Nam, Juryon Paik, Ung Mo Kim, and Dongho WonACNS 2007, LNCS 4521158-1762007.06.
73Mobile P2P group communication Protocol for Confidence and AnonymitySungjin Lee, Seokhyun Jang, Yongwook Kim, Donghyun Choi, Seungjoo Kim, Dongho WonThe First International Conference on Ubiquitous Information Management and Communication166-1742007.02.07
72Analysis of Composed TOE in the common criteriaHanjae Jeong, Kwangwoo Lee, Seungjoo Kim, and Dongho WonThe First International Conference on Ubiquitous Information Management and Communication500-5042007.02.07
71An Efficient and Secure License Sharing Scheme for Authorized domain DRMDonghyun Choi, Yunho Lee, Seungjoo Kim, Dongho WonThe 2nd International Joint Workshop on Information Security and It's Application100-1112007.02.07
70A Protection Profile for the Access Control Based Database Security System in Sniffing ModelWoongryul Jeon, Heauk Jo, Yunho Lee, Seungjoo Kim, Dongho WonProceeding of IJWISA 2007150-1602007.02.07
69A Study on the Security Specification for Conversion Technologies of Heterogeneous DRM SystemHeasuk Jo, Kyongho Son, Yunho Lee, Seungjoo Kim, Dongho WonProceeding of IJWISA 2007170-1812007.02.07
68A Study On Advanced Zoning Method of SANHaelahng Choi, Hanjae Jeong, Byunghee Lee, Seungjoo Kim, and Dongho WonProceeding of IJWISA 2007236-2412007.02.07
67Cleaning Policy for Secure Deletion of Data from Flash Memory in Mobile Phone Woongryul Jeon, Heasuk Jo, Seungjoo Kim, Dongho WonProceeding of IJWISA 2007251-2552007.02.07
66Efficient Password-Authenticated Key Exchange Based on RSASangjoon Park, Junghyun Nam, Seungjoo Kim and Dongho WonRSA conference, LNCS 4377309-3232007.02.05
65The Threat Modeling and Choosing a Better CountermeasureYunyoung Lee, Donghwi Shin, Kwangwoo Lee, Seungjoo Kim, and Dongho WonThe First International Conference on Ubiquitous Information management and Communication174-1842007.02.
64A Recovery Method of the Deleted Certificate and the Privacy-Key Encryption Password using Commercial Forensic ToolsYounsung Choi, Younggyo Lee, Junghyun Nam, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won The 6th International Conference on Application and Principles of Information Science201-2042007.01.23
63Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network Namje Park, Seungjoo, and Dongho WonAWIC' 2007 Advances in Soft Computing 43. Springer278-2832007.
62Group Key Agreement Protocol Among Mobile Devices in Different CellsJeeyeon Kim, Seungjooo Kim, Kilsoo Chun, Jaeil Lee, Dongho WonISPA 2006, LNCS 43311090-10972006.12.04
61An Efficient Dispute Resolving Method for Digital ImagesYunho Lee, Heasuk Jo, Seungjoo Kim and Dongho WonOTM Confederated International Workshops and Posters, LNCS 4277331-3412006.11.01
60Security enhancement of a remote user authentication scheme using smart cardsYoungsook Lee, Junghyun Nam, Dongho WonOTM Confederated International Workshops and Posters, LNCS 4277508-5162006.11.01
59Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network ServicesNamje Park, Jin Kwak, Seungjoo Kim, Dongho Won and Howon KimKES 2006, LNAI 4251924-9342006.10.09
58Limitations, Threats and Requirements in RFID System Jin Kwak, Sangsoo Yeo, Seungjoo Kim, dongho Won and Kouichi SakuraiJWIS 20062006.09.20
57An RFID System Based MCLT System with Improved Privacy Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim Seungjoo Kim Kouichi Sakurai, and Dongho WonEUC 2006 Workshop SecUbiq LNCS 4097579-5902006.08.01
56Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho WonIAVoSS Workshop On Trustworthy Elections Proceedings145-1522006.06.29
55A Security and Privacy Enhanced Protectio Scheme Secure 900 MHz UHF RFID Reader on Mobile PhoneNamje Park, Haedong Lee, Howon Kim, and Dongho Won2006 IEEE Tenth International Symposium on Consumer Electronics ISEC 2006 (CD)2006.06.28
54Privacy Enhanced Wireless Internet Platform for Secure UHF Mobile RFID Namje Park, Howon Kim, Kyoil Chung, Dongho WonPARA 062006.06.18
53Information System Modeling for Analysis of Propagation Effects and Levels of DamageInJung Kim, YoonJung Chung, YoungGyo Lee, Eul Gyu Im, and Dongho WonProc. of ICCSA 2006 Springer-Verlag, LNCS 398254-632006.05.07
52Enhancement of a Three-Party Verifier-Based Key Agreement Protocol without Using Public Keys Youngsook Lee, Junghyun Nam, Seungjoo Kim, and Dongho WonGESTS international Transactions on Computer Science and Engineering, Vol. 31, No.12006.05.01
51The Plan and Tools for Vulnerability Testing in Information Software-Based Systems Injung Kim, Younggyo Lee and Dongho Won Korea Information Processing Society IJIPS75-782006.01.
50可認證對話密鍵同意協議于萍, 郭鎭, 金昇柱, 元東豪信息安全與通信 保密 138 號95-1002005.06.
49Dynamic Group Key Exchange over High Delay Networks Junghyun Nam, Sungduk, Seungjoo Kim, and Dongho WonProc. of ISPC COMM. 2004 International Scientific-Practical conference on Communication 20042004.08.22
48A Study on Risk Modeling over Information and Communication Infrastructure, Injung Kim, Yoonjung Jung, Joogil Park, and Dongho WonProceeding of The 2004 International Conference on Security and Management(SAM2004)2004.06.
47A Study on a New Password based Key Distribution Protocol using The Server's Master Key Enhanced Privacy Authentication Combining Authentication Approaches in Wireless EnvironmentsDongkyu Won Jin Kwak, Hyungkyu Yang, Dongho WonIEICE Proceeding of the 2004 Symposium on Cryptography and Information Security429-4332004.01.27
46Enhanced Privacy Authentication Combining Authentication Approaches in Wireless EnvironmentsJinwoo Lee, Kieon Song, Jin Kwank, Hyungkyu Yang, Dongho WonIEICE Proceeding of the 2004 Symposium on Cryptography and Information Security921-9262004.01.27
45Real-time Certificate Validation Service by Client’s Selective Request.Jin Kwak, Seungwoo Lee, Soohyun Oh, Dongho WonIntelligent Systems Design and Applications. Springer Berlin Heidelberg207-2182003.
44Delegated certificate validation model applicable to the wireless pki Jin Kwak, SeungWoo Lee, KyungJin Kim, DongHo WonWSEAE Transactions on Communications55-602002.10.
43The password-based key exchange protocol using a password-hardening protocol Sangman Ahn, Soohyun Oh,Dongho WonWSEAS Information Security146-1492002.10.
42Efficient Key Agreement Protocol using Proxy Server for Wireless communication Soohyun Oh, Jin Kwak, Sangman Ahn, Dongho WonWSEAS Information Security244-2492002.10.
41Real-time Certificate Status Validation Model with CSIProvider Jin Kwak, Kyung-Jin Kim, Soo-Hyun Oh, Dong-Ho Won and Hyung-Kyu YangWSEAE Transactions on Communications203-2102002.07.
40Practical Use of Key Agreement Protocols Proceedings of the International Conference on Security and ManagementKyung-Jin Kim, Jin Kwak, and Dong-Ho WonProceedings of the International Conference on Security and Management, SAM '02120-1262002.06.24
39How to Buy Digital Contents Anonymously in E-Commerce, Yang-Kyu Lim, Ok-Hyun Ha, Chang-Hoon An, and Dong-Ho WonProceedings of the International Conference on Security and Management, SAM '02451-4572002.06.24
38Certificate Validation Service Providing Selective Request InformationJin Kwak, SeungWoo Lee, KyungJin Kim, SungDuk, Kim, and DongHo WonProceedings of the International Conference on Security and Management, SAM '02465-4702002.06.24
37How secure are the Girault's Self-certified Public-key based Key agreement Protocols against Active attacks Soo-Hyun Oh, Kyung-Jin Kim, Kyung-Ah Shim, M.Mambo, and Dong-Ho WonSymposium on Cryptography and Information Security (SCIS), IEICE423-4282002.01.29
36A Study on the Security of Key Agreement Protocol based on Asymmetric techniques against Passive attackSang-Man Ahn, Bo-Yeon Song, M.MamBo, H.Shizuya, Dong-Ho WonSymposium on Cryptography and Information Security (SCIS), IEICE955-9602002.01.29
35Improvement of Probabilistic Public Key Cryptosystem Using Discrete LogarithmDug-Hwan Choi, Seungbok Choi and Dongho WonICISC KIISC91-1002001.12.07
34An efficient Key Recovery system suitable for PKI with multiple escrow agents Hui-Jong Yu, Hee-Bon Choi, Hyungon Kim, Dong-Ho WonWISA 2001375-3622001.09.13
33A Secure Mobile E-Commerce Digital Contents Protocol based Wireless Application Protocol Yangkyu Lim, Sangjin Kook and Dongho WonASW, 2001213-2212001.07.25
32The Improvement of the 3-pass Password-Based Key Exchange ProtocolH.K.Lee, J.H.Nah, H.S.Jo, D.H.WonCISC '99“, Proceedings of International Conference on Internet Computing IC'2001897-9032001.06.25
31Forward-Secure Commercial Key Escrow Systems Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sangjoon Park and Dongho WonIEEE Computer Society2001.06.22
30A Flexible Key Recovery System Integrated with Key Distribution Joonsuk Yu, Soohyun Oh, Jeongneyo Kim, Kyoil Chung and Dongho WonISE'2001 Proceeding of the international symposium on information system and engineering444-4502001.
29Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributorChanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho WonKorea Institute of Information Security and Cryptology, ICISC 20002000.12.08
28An Efficient Satellite CAS Using Password-Based ProtocolYoungsoo Kim, Joonsuk Yu, Dongho WonThe association for intelligent machinery607-6112000.03.03
27Digital Watermarking and Practical Distribution Protocol for Digital Contents Copyright ProtectionJongmin Jeon, Byungman Lee, Kyungkook Kim, and Dongho WonKIISC, proceedings of WISA2000.
26The authentication scheme for collaborative multimedia framework based watermakingKyungkug Kim, Joogul Sim, Dongho WonIEEE Signaling Chapter, Singapore ICICS '991999.12.07
25The authentication over watermarking with public key applied to collaborative multimedia frameworkKyungkug Kim, Jongmin Jun, Dongho WonIEEE Malaysia1999.11.
24The authentication scheme involving participants of collaborative multimedia framework based conferenceKyungkug Kim, Dongwook Cho, Dongho WonThe 1999 International Technical Conference on Circuits / Systems, Computers and communications (Janan)1039-10421999.07.13
23An Efficient Proxy-Authentication Scheme for Mobile EnvironmentBoyoung Lee, Miri Joo, Yeonyi Choi and Dongho WonCryptographic Technigues & E-Commerce '99176-1781999.07.07
22Verifiable self-certified public keysSeungjoo Kim, Soo-Hyun Oh, and Dongho WonWorkshop on Coding and Cryptography, INRIA139-1481999.01.11
21One-time self-certified public keys, revisitedSeungjoo Kim, Soo-Hyun Oh, Kyung-Guk Kim and Dongho WonICISC '9859-701998.12.
20An one-pass mutual authentication key agreement scheme using nominative signatures with message recoveryIn Sook Lee and Dong Ho WonSEACOMM'98 South east communications conference ' 981998.08.
19An Improved Single Term Off-Line CoinsYoungchul Choi, Hyungkyu Yang and Dongho Won1997 Korea-Japan JW-ISC89-941997.09.
18ID-Based Multisignature Scheme Based on High Residuosity ProblemBoyoung Lee, Seungjoo Kim and Dongho Won1997 Korea-Japan JW-ISC1997.09.
17The Problem of Single Term Off Coins and CountermeasuresYoungchul Choi, Seungjoo and Dongho WonIEICE and KITE(Okinawa Japan)1997.07.
16Zero knowledge nominative signatureS.J.Kim, S.J.Park, D.H.WonPragocrypt'96380-3921996.10.
15A Paradoxical ID-Based Key Distribution Prdtocol for Moble CommunicationYeon Yi Choi, Seoung Joo Kim, Sung Jun Park and Dong Ho WonSystems KITE IXICE and IEEE412-4151996.07.
14Verifiable secret sharing and multiparty protocol in distributed systemsHK Yang, JY Kim, CY Kwon, DH Won1995 IEEE Singapore International Conference on network / International Conference on Information Engineering637-6431995.07.
13A Provably entrusted undeniable signatureSung Jun Park, Tae Hoon Kim, Young Hwa An, Dong Ho Won1995 IEEE Singapore International Conference on network / International Conference on Information Engineering644-6481995.07.
12An entrusted undeniable signatureS.J.Park, K.H.Lee, D.H.Won1995 Japan-Korea joint workshop on information security and cryptology129-1261995.01.
11A practical group signatureS.J.Park, I.S.Lee, D.H.Won1995 Japan-Korea joint workshop on information security and cryptology127-1331995.01.
10A Secure Multiway Election SchemeSungjun Park, Boyoung Lee, Dongho WonTwelfth International Conference on Computer Communication426-4311995.
9A Practical Identity-based Group SignatureSungjun Park , Dongho WonThe 1995 International Conference on Electronics, Information and Communication64-671995.
8Nomiative SignatureSeungjoo Kim, Sungjun Park and Dongho WonThe 1995 International Conference on Electronics, Information and Communication68-711995.
7An efficient Sequential Multisigature SchemeSungduk Kim, Hyungkyu Yang and Dongho WonThe 1995 International Conference on Electronics, Information and Communication72-751995.
6Efficient TCM Decoding Algorithm for Satellite CommunicationsJi Won Jung and Dongho Won 1995 joint technical conference on circuit / systems, computer and communications (Kumamoto, Japan)273-2771995.
5A Probabilistic Encryption Using Very High Residuosity and ApplicationSung Jun Park, Bo Young Lee, Dong Ho WonIEEE 1995 Global Telecommunications Conference1179-11821995.
4A Generalization of Public Key Residue cryptosystemSung-Jun Park, Dong-Ho Won1993 KOREA-JAPAN JOINT WORKSHOP ON INFORMATION SECURITY AND CRYPTOLOGY, Technical Report of IEICE, SEC93-54187-1911993.10.
3Two Round ZKIP of Knowledge for SAT and its ApplicationsHyung-Kyu Yang, Ji-Won Jung, Dong-Ho WonIEEE Singapore International Conferance on Information, Engineering‘93512-5171993.09.
2A Study on TCM Decoder Performance for PSK, PAM,QAM in the Gaussian Impulsive Noise ChannelJi-Won Jung, Hyung-Kyu Yang, Dong-Ho WonIEEE Singapore International Conference on Information Engineering‘93791-7951993.09.
1A study on the efficient zero knowledge message authentication secure against chosen ciphertext attackHyung Kyu Yang, Kyung Shin Kim, Dong Ho Won1993 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS219-2241993.08.