247 | A Study of Split Learning Model | Jihyeon Ryu, Dongho Won, Youngsook Lee | IMCOM 2022, Seoul, Korea | 1-4 | 2022.01.03 |
246 | Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure | Hakjun Lee, Jihyeon Ryu, Youngsook Lee, Dongho Won | IMCOM 2021, Seoul, Korea | 1-4 | 2021.01.03 |
245 | On a Partially Verifiable Multi-party Multi-argument Zero-knowledge Proof | Hoil Ryu, Dongwoo Kang, Dongho Won | IMCOM 2021, Seoul, Korea | 1-8 | 2021.01.03 |
244 | Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS | Sewan Ha, Hakjun Lee, Dongho Won, Youngsook Lee | IMCOM 2020, Taichung, Taiwan | 1-8 | 2020.01.03 |
243 | Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem | Dongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee | IMCOM 2020, Taichung, Taiwan | 1-8 | 2020.01.03 |
242 | Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment | Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won | IMCOM 2020, Taichung, Taiwan | 1-4 | 2020.01.03 |
241 | Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks | Jihyeon Ryu, Youngsook Lee, Dongho Won | ICCST 2019, Kota Kinabalu, Malaysia | 341-349 | 2019.08.30 |
240 | Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks | Jihyeon Ryu, Taeui Song, Jongho Moon, Hyoungshick Kim, and Dongho Won | ICCST 2018, Kota Kinabalu, Malaysia | 49-58 | 2018.08.28 |
239 | Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments | Jongho Moon, Youngsook Lee, Hyungkyu Yang, Hakjun Lee, Sewan Ha, and Dongho Won | ICCSA 2018, Melbourne, Australia | 541-557 | 2018.07.03 |
238 | Cryptanalysis and Improvement of an ECC-based Authentication Protocol for Wireless Sensor Networks | Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, and Dongho Won | ICCSA 2018, Melbourne, Australia | 50-61 | 2018.07.03 |
237 | Cryptanalysis of a Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme | Chunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang and Dongho Won | ICOIN 2018, Chiang Mai, Thailand | 438-441 | 2018.01.10 |
236 | Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security | Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song and Dongho Won | ICOIN 2018, Chiang Mai, Thailand | 432-437 | 2018.01.10 |
235 | Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments | Jongho Moon, Taeui Song, Seokhyang Cho and Dongho Won | IMCOM 2018, Langkawi, Malaysia | 1-8 | 2018.01.05 |
234 | Cryptanalysis of an Authentication Scheme for Multi-Gateway Wireless Sensor Networks | Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim and Dongho Won | ICDIM 2017, Fukuoka, Japan | 134-138 | 2017.09.12 |
233 | Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard | Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won | AHFE 2017, Los Angeles, USA | 78-84 | 2017.07.17 |
232 | Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards | Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won | AHFE 2017, Los Angeles, USA | 62-71 | 2017.07.17 |
231 | Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security | Jongho Moon, Taeui Song, Donghoon Lee, Youngsook Lee, Dongho Won | AHFE 2017, Los Angeles, USA | 72-77 | 2017.07.17 |
230 | Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care | Jongho Moon, Hyungkyu Yang, Youngsook Lee, Dongho Won | ACM IMCOM 2017, Beppu, Japan | 1-8 | 2017.01.04 |
229 | Cryptanalysis and Improvement of Robust Authentication Scheme for Telecare Medicine Information Systems | Dongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, Dongho Won | ACM IMCOM 2017, Beppu, Japan | 1-8 | 2017.01.04 |
228 | Cryptanalysis and Improvement of a Biometric and Smart Card Based Remote User Authentication Scheme | Chunyi Quan, Jaewook Jung, Jiye Kim, Qimin Sun, Donghoon Lee, Dongho Won | ACM IMCOM 2017, Beppu, Japan | 1-8 | 2017.01.04 |
227 | An Enhanced Unlinkable Anonymous Payment Scheme Based on Near Field Commnication | Hakjun Lee, Jiye Kim, Jaewook Jung, Youngsook Lee, Dongho Won | ACM IMCOM 2017, Beppu, Japan | 1-8 | 2017.01.04 |
226 | A Security Enhanced Lightweight Mobile Payment Scheme Based on Two Gateways | Hakjun Lee, Jiye Kim, Jongho Moon, Dongwoo Kang, and Dongho Won | 2016 2nd International Conference on Systems, Control and Communications Bangkok, Thailand | | 2016.12.16 |
225 | Security Enhanced Anonymous User Authenticated Key Agreement Scheme using Smart Card | Jaewook Jung, Donghoon Lee, Hakjun Lee, and Dongho Won | 2016 2nd International Conference on Systems, Control and Communications Bangkok, Thailand | | 2016.12.16 |
224 | Software Birthmark Method Using Combined Structure–based and API–based | Donghoon Lee, Dongwoo Kang, Jiye Kim, and Dongho Won | 2016 2nd International Conference on Systems, Control and Communications Bangkok, Thailand | | 2016.12.16 |
223 | Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment | Jongho Moon, Jiye Kim, Donghoon Lee, Dongho Won | 2016 4th Intl Conf on Applied Computing and Information Technology, Las Vegas, USA | 14-19 | 2016.12.13 |
222 | Public Key-based Session Key Establishment for Hierarchical Sensor Networks | Jiye Kim, Jongho Moon, Jaewook Jung, Donghoon Lee, Youngsook Lee, and Dongho Won | The 9th International Conference on Security Technology (SecTech 2016), Jeju Isalnd, Korea | | 2016.11.24 |
221 | Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks | Youngseok Chung, Seokjin Choi and Dongho Won | ICCSA 2016, Beijing, China, LNCS 9789 | 289-301 | 2016.07.04 |
220 | Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment | Dongwoo Kang, Jongho Moon, Donghoon Lee and Dongho Won | ICCSA 2016, Beijing, China, LNCS 9790 | 87-99 | 2016.07.04 |
219 | An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment | Qimin Sun, Jongho Moon, Younsung Choi and Dongho Won | GPC 2016 (Xian) Springer, LNCS 9663 | 229-242 | 2016.05.07 |
218 | Cryptanalysis of Smart Card Based Remote User Authentication Scheme for Multi-Server Environment | Qimin Sun, Jongho Moon, Younsung Choi and Dongho Won | ICIAE 2016, Beppu, Japan | 1-6 | 2016.03.26 |
217 | Security Analysis of user Authentication and Key Establishmenet scheme for WSNs in IoT Applications | Jiye Kim, Dongwoo Kang and Dongho Won | ICESI 2016, Jeju Isalnd, Korea | 172-175 | 2016.03.23 |
216 | Security analysis of an enhanced biometric-based three factors user authentication scheme for multi-server environments | Jongho Moon, Jiseon Yu, Qimin Sun and Dongho Won | ICESI 2016, Jeju Isalnd, Korea | 165-168 | 2016.03.23 |
215 | Secure authenticaion and key agreement scheme preserving user anonymity in mobile networks | Youngseok Chung, Youngsook Lee and Dongho Won | ICESI 2016, Jeju Isalnd, Korea | 180-183 | 2016.03.23 |
214 | Improvement of biometrics and smart cards-based authentication scheme for multi-server environments | Jongho Moon, Jiseon Yu, Hyungkyu Yang and Dongho Won | ACM IMCOM 2016, Danang, Vietnam | 1-8 | 2016.01. |
213 | Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function | Jaewook Jung, Donghoon Lee, Jiye Kim, Dongwoo Kang, Youngsook Lee and Dongho Won | ACM IMCOM 2016, Danang, Vietnam | 1-8 | 2016.01. |
212 | Securty Analysis of Mobile Authentication using QR-Codes | Siwon Sung, Joonghwan Lee, Jinmok Kim, Jongho Mun and Dongho Won | Seventh International Conference on Networks & Communications, Sydney, Australia | 151-160 | 2015.12.26 |
211 | Cryptanalysis on Symmetric Key Techniques based Authentication Scheme for Wireless Sensor Networks | Younsung Choi, Youngsook Lee and Dongho Won | CSA 2015 (Cebu) Springer, LNEE 373 | 7-13 | 2015.12.15 |
210 | Cryptanalysis of Dynamic ID-based User Authentication Scheme using Smartcards without Verifier Tables | Jaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, Jongho Mun and Dongho Won | CSA 2015 (Cebu) Springer, LNEE 373 | 45-51 | 2015.12.15 |
209 | Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem | Jongho Mun, Jiseon Yu, Jiye Kim, Hyungkyu Yang and Dongho Won | CSA 2015 (Cebu) Springer, LNEE 373 | 1-6 | 2015.12.15 |
208 | Secure Deletion for Flash-Based Self-Encrypting Drives | Hanwook Lee, Jongho Mun, Jiye Kim, Youngsook Lee and Dongho Won | CUTE 2015 (Cebu) Springer, LNEE 373 | 559-566 | 2015.12.15 |
207 | Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices | Dongwoo Kang, Jongho Mun, Donghoon Lee and Dongho Won | CUTE 2015 (Cebu) Springer, LNEE 373 | 309-315 | 2015.12.15 |
206 | An Improvement of User Authentication Framework for Cloud Computing | Jongho Mun, Jiye Kim, and Dongho Won | ICCTD2015, No. 7, Singapore | 1-9 | 2015.11.16 |
205 | Cryptanalysis of Biometric-based Multi-server Authentication Scheme Using Smart Card | Jongho Mun, Jiye Kim, Donghoon Lee and Dongho Won | QSHINE 2015, No. 11, Taipei, Taiwan | 56-59 | 2015.08. |
204 | Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks | Younsung Choi, Junghyun Nam, Youngsook Lee, Seyoun Jung, and Dongho Won | InforTech 2015, Computer Science and its Applications, Lecture Notes in Electrical Engineering, Vol. 330, Taipei, Taiwan | 1367-1375 | 2015.08. |
203 | An Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables | Jongho Mun, Jiye Kim, Donghoon Lee, Jaewook Jung, Younsung Choi, and Dongho Won | WORLDCOMP 15, Las Vegas, Nevada, USA | 152-156 | 2015.07.27 |
202 | Statistical Analysis Between Malware and Benign Based on IA-32 Instruction | Dongwoo Kang, Donghoon Lee, Jaewook Jung, and Dongho Won | Proceedings of the The Fourth International Conference on Informatics & Applications, Takamatsu, Japan, 2015 | 32-42 | 2015.07. |
201 | Security Improvement of Portable Key Management using a Mobile phone | Jiye Kim, Donghoon Lee, Younsung Choi, Youngsook Lee, and Dongho Won | Computational Science and Its Applications--ICCSA 2015. Springer International Publishing (LNCS), Banff, Alberta, Canada | 148-159 | 2015.06.08 |
200 | A novel smart card-based remote user authentication mechanism | Deborah Uwera and Dongho Won | SICEAS 2015, No. 183, Seoul, South Korea | 197-199 | 2015.01. |
199 | Password-Based Single-File Encryption and Secure Data Deletion for Solid-State Drive | Younsung Choi, Donghoon Lee, Woongryul Jeon, Dongho Won | ICUIMC 2014, Siem Reap, Cambodia, January 09-11 | | 2014. |
198 | An Enhanced Remote User Authentication Scheme Using Smart Card | Jaewook Jung, Woongryul Jeon, Dongho Won | ICUIMC 2014, Siem Reap, Cambodia, January 09-11 | | 2014. |
197 | Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function | Youngil Kim, Younsung Choi, Dongho Won | ICISA 2014, IEEE computer society, Seoul, Korea | 252-255 | 2014. |
196 | Security Analysis of a Delegation-Based Authentication Protocol for Wireless Roaming Service | Mijin Kim, Namje Park, Dongho Won | MUE 2014, LNEE 308, Zhangjiajie, China | 445-450 | 2014. |
195 | An Improvement of Encrypted Remote User Authentication Scheme by Using Smart Card | Jongho Mun, Jiye Kim, Woongryul Jeon, Youngsook Lee, and Dongho Won | MUE 2014, LNEE 308, Zhangjiajie, China | 451-458. | 2014. |
194 | Countermeasure on Password-Based Authentication Scheme for Multi-server Environments | Youngsook Lee, Jiye Kim, and Dongho Won | MUE 2014, LNEE 308, Zhangjiajie, China | 459-466 | 2014. |
193 | Cryptanalysis of Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System | Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Dongho Won | DigitalSec 2014, The Society of Digital Information and Wireless Communications, Ostrava, Czech | 46-55 | 2014. |
192 | An Improvement of Secure Remote User Authentication Scheme using Smart Cards | Jongho Mun, Qiuyan Jin, Woongryul Jeon, Dongho Won | ICITCS 2013, Macau, China | 1-4 | 2013.12. |
191 | A Secure User-friendly Authentication Scheme with Anonymity for Wireless Communications | Woongryul Jeon, Yunho Lee, Dongho Won | ICUIMC 2013, Volume 37 Number 3, Kota Kinabalu,, Malaysia, January | 17-19 | 2013. |
190 | On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol | Youngsook Lee and Dongho Won | GPC 2013 Springer Verlag LNCS 7861 | 730-736 | 2013. |
189 | Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks | Youngseok Chung, Youngsook Lee and Dongho Won | GPC 2013 Springer Verlag LNCS 7861 | 752-760 | 2013. |
188 | Cryptanalysis of an authenticated group key transfer protocol based on secret sharing | Mijin Kim, Namje Park, and Dongho Won | GPC 2013 Springer Verlag LNCS 7861 | 761-766 | 2013. |
187 | Security Requirement of End Point Security Software | Hyun-Jung Lee, Youngsook Lee and Dongho Won | GPC 2013 Springer Verlag LNCS 7861 | 788-795 | 2013. |
186 | Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System | Inkyung Jean, Youngsook Lee and Dongho Won | GPC 2013 Springer Verlag LNCS 7861 | 796-802 | 2013. |
185 | Improvement of a Chaotic Map Based Key Agreement Protocol that Preserves Anonymity | Hyunsik Yang, Jin Qiuyan,Hanwook Lee Kwangwoo Lee, and Dongho Won | GPC 2013 Springer Verlag LNCS 7861 | 803-810 | 2013. |
184 | A Design of Real-time Restriction System based on User’s Behavior in the Online Game | Donghoon Lee, Woongryul Jeon, Hanwook Lee, and Dongho Won | Research Notes in Information Science 2013(RNIS 2013), Jeju island, Korea | 352-354 | 2013. |
183 | Fingerprint-based User Authentication Scheme for Home Healthcare system | Qiuyan Jin, Woongryul Jeon, Changwhan Lee ,Youngchul Choi, Dongho Won | The Fifth International Conference on Ubiquitous and Future Networks ICUFN 2013 | 178-183 | 2013. |
182 | High-Level Design for a Secure Mobile Device Management System | Keunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, and Dongho Won | Springer Berlin Heidelberg, LNCS 8030 | 348-356 | 2013. |
181 | Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing | Mijin Kim, Namje Park, and Dongho Won | MUSIC 2013, LNEE 274, Springer Gwangju, Korea | 483-488 | 2013. |
180 | Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks | Youngseok Chung, Seokjin Choi, Youngsook Lee, and Dongho Won | MUSIC 2013, LNEE 274, Springer Gwangju, Korea | 535-540 | 2013. |
179 | Protection Profile for PoS (Point of Sale) System | Hyun-Jung Lee Youngsook Lee and Dongho Won | MUSIC 2013, LNEE 274, Springer Gwangju, Korea | 495-500 | 2013. |
178 | Scalable Key Management for Dynamic Group in Multi-cast Communication | Fikadu B.Degefa, and Dongho Won | MUSIC 2013, LNEE 274, Springer Gwangju, Korea | 521-527 | 2013. |
177 | Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card | Jongho Mun, Jiye Kim, WoongryulJeon, Youngsook Lee, Dongho Won | CSA-13, LNEE 279, Springer Danang, Vietnam | 423-428 | 2013. |
176 | Security Controls based on K-ISMS in Cloud Computing Service | Jongho Mun, Youngman Jung, Jeeyeon Kim, Youngsook Lee, Kidam Park, Dongho Won | CSA-13, LNEE 279, Springer Danang, Vietnam | 391-404 | 2013. |
175 | Improved Delegation-Based Mobile Authentication Protocol for Wireless Roaming Service | Mijin Kim, Namje Park, Dongho Won | UCES-13, Danang, Vietnam | | 2013. |
174 | Key Management Scheme using Dynamic Identity-Based Broadcast Encryption for Social Network Services | Youngman Jung, Yoonho Nam, Jiye Kim, WoongryulJeon, Hanwook Lee, Dongho Won | CSA-13, LNEE 279, Springer Danang, Vietnam | 435-443 | 2013. |
173 | Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key Agreement | Mijin Kim, Namje Park, and Dongho Won | CSA 2012 (Jeju) Springer, LNEE 203 | 687-692 | 2012.12. |
172 | Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System | Namje Park, Seunghyun Cho, Byung-Doo Kim, Byunggil Lee, and Dongho Won | CSA 2012 (Jeju) Springer, LNEE 203 | 699-705 | 2012.12. |
171 | Experimentation and Validation of Web Application's Vulnerability Using Security Testing Method | Taeseung Lee, Giyoun Won Seongje Cho, Namje Park, and Dongho Won | CSA 2012 (Jeju) Springer, LNEE 203 | 723-731 | 2012.12. |
170 | A Practical Study on Advanced Persistent Threats | Inkyung Jeon, Yoongsook Lee, Dongho Won | SecTech 2012 (Jeju) Springer, CCIS 339 | 144-152 | 2012.11.28 |
169 | Security Issues and Threats According to the Attribute of Cloud Computing | Hyangjin Lee, Jeeyeon Kim, Youngsook Lee, and Dongho Won | SecTech 2012 (Jeju) Springer, CCIS 339 | 101-108 | 2012.11.28 |
168 | Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Muli-server Environment | Mijin Kim, Namje Park, and Dongho Won | SecTech 2012 (Jeju) Springer, CCIS 339 | 122-127 | 2012.11. |
167 | Design of a Simple User Authentication Scheme Using OR-Code for Mobile Device | Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, and Dongho Won | STA 2012, Gwangju, Korea, LNEE 180 | 241-247 | 2012.09.06 |
166 | Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment | Mijin Kim, Namje Park, and Dongho Won | STA 2012, Gwangju, Korea, LNEE 180 | 233-240 | 2012.09.06 |
165 | Security Analysis of Authentication Scheme for Wireless communications with User Anonymity | Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, and Dongho Won | STA 2012, Gwangju, Korea, LNEE 180 | 225-231 | 2012.09.06 |
164 | A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques | 이창환, 양현식, 이병희, 원동호 | ICHIT 2012, LNCS 7425 | 608-617 | 2012.08.23 |
163 | A Study on method to analyze application on bada using GUI without source code | Hanjae Jeong, Dongho Won | ASIAJCIS 2012, Tokyo, Japan, August 09 -10, 2012 | 70 | 2012.08.09 |
162 | Security Analysis on Password-based Authentication Scheme for Multi-Sever Environments | 이영숙, 김지연, 원동호 | CNSI 2012 ASTL, Vol. 8 | 97-101 | 2012.07.16 |
161 | A Survey of Web Search Engines | 백주련, 남정현, 김응모, 원동호 | CNSI 2012 ASTL, Vol. 8 | 155-159 | 2012.07.16 |
160 | Valuable Association Rules Extraction from XML-Based Tree Data | 백주련, 남정현, 김응모, 원동호 | CNSI 2012 ASTL, Vol. 8 | 160-163 | 2012.07.16 |
159 | Experimental Study on the Possibility of DDoS Attack in Mobile Network | Kyoungju Kwak, Kwangwoo Lee and Dongho Won | IAM 2012, International Conference on Innovation and Management, Koror, Palau, July 15-18, 2012 | 37 | 2012.07.15 |
158 | Database Encryption Implementation and Analysis using Graphics Processing Unit | Inkyung Jeun,Hyun-Chul Jung, Nan-Ki Lee, Dongho Won | The 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC 2012), Vancouver, Canada | 109-113 | 2012.06.26 |
157 | Cryptanalysis and Improvement of a Biometrics-Based Multi-server authentication with Key Agreement Scheme | Hakhyun Kim, Woongryul Jeon, Kwang-Woo Lee, Yunho Lee, Dongho Won | LNCS 7335. ICCSA. Bahia Brazil | 391-406 | 2012.06.18 |
156 | Enhanced Password-Based User Authentication Using Smart Phone | 전인경, 김미진, 원동호 | LNCS 7296, GPC 2012 | 361-369 | 2012.05.13 |
155 | Security Analysis of Zhao and Gu's Key Exchange Protocol | Junghyun Nam, Juryon Paik, Dongho Won | IST 2012, Shanghai, China, April 28-30 | 43-45 | 2012.04.28 |
154 | Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices | Junghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, Woongryul Jeon, Dongho Won | ISA 2012, Shanghai, China, April 28-30 | 89-91 | 2012.04.28 |
153 | An Off-Line Dictionary Attack on Abdalla and Pointcheval's 3-Party Key Exchange Protocol | Junghyun Nam, Jinsoo Kim, Juryon Paik, Dongho Won | ISA 2012, Shanghai, China, April 28-30 | 74-76 | 2012.04.28 |
152 | Protection Profile for Mobile Device Management System | Keunwoo Rhee, Woongryul Jeon and Dongho Won | ISA 2012, Shanghai, China, April 28-30 | 187-189 | 2012.04.28 |
151 | Cryptanalysis of a two-factor user authentication scheme over insecure channels | Jin Qiuyan, Kwangwoo Lee, Dongho Won | ISA 2012, Shanghai, China, April 28-30 | 107-109 | 2012.04.28 |
150 | A study on method to analyze application on bada without source code | Hanjae Jeong and Dongho Won | IST 2012, April 28-30 | 203-205 | 2012.04.28 |
149 | An Efficient User Authentication Scheme for Wireless Communications | Woongryul Jeon, Kwangwoo Lee, Byunghee Lee, Yunho Lee, Dongho Won | ASP 2012,Seoul, March 30-31, 2012 | 87 | 2012.03.30 |
148 | A Practical and Secure Remote User Authentication Scheme Using Smart Cards | Qiuyan Jin , Kwangwoo Lee, and Dongho Won | ASP 2012,Seoul, March 30-31, 2012 | 89 | 2012.03.30 |
147 | A Method for Secure and Efficient Block Cipher using White-Box, Cryptography | Jaesung Yoo, Hanjae Jeong, and Dongho Won | ICUIMC, February 20-22 | 17- | 2012.02.20 |
146 | On the Security of a Novel Protocol for Downloadable CAS | Hanjae Jeong, Seungjoo Kim and Dongho Won | ICUIMC, February 20-22 | 15- | 2012.02.20 |
145 | Privacy-enhanced social network service (SNS) | Hanjae Jeong, Changbin Lee, Jin Kwak, Dongho Won Changyoung Kwon, Seungjoo Kim | FTRA WCC-ACSA 2011, December 12-15 | | 2011.12.12 |
144 | A Study on the Secure Home Healthcare Wireless Service | Changwhan Lee, Dongho Won Namje Park | FGIT 2011, LNCS 7105 | 277-284 | 2011.12.07 |
143 | An Improved Anonymous Electronic Prescription Scheme | Chanjoo Chung, Kwangwoo Lee, Jungmee Yun, and Dongho Won | FGIT 2011, LNCS 7105 | 293-300 | 2011.12.07 |
142 | Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File | Donghwi Shin, Kwangwoo Lee, and Dongho Won | FGIT 2011, LNCS 7105 | 301-308 | 2011.12.07 |
141 | Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing | Junghyun Nam, Moonseong Kim, Juryon Paik, Woongryul Jeon, Byunghee Lee, and Dongho Won | FGIT 2011, LNCS 7105 | 309-315 | 2011.12.07 |
140 | Protection Profile for Data Leakage Protection System | Hyun-Jung Lee and Dongho Won | FGIT 2011, LNCS 7105 | 316-326 | 2011.12.07 |
139 | Security Analysis on Digital Signature Function Implemented in PDF Software | Sunwoo Park, Changbin Lee, Kwangwoo Lee, Jeeyeon Kim, Youngsook Lee, and Dongho Won | FGIT 2011, LNCS 7105 | 327-334 | 2011.12.07 |
138 | Information Technology Security Evaluation Using CERT C Secure Coding Standard | Taeseung Lee, Kwangwoo Lee, Dongho Won and Namje Park | FGIT 2011, LNCS 7105 | 335-342 | 2011.12.07 |
137 | USN Middleware Access Control of Sensor Network and Selective Encryption of Information | Taeseung Lee, Dongho Won and Namje Park | FGIT 2011, LNCS 7105 | 343-352 | 2011.12.07 |
136 | Enhanced Code-Signing Scheme for Smartphone Applications | Inkyung Jeun, Kwangwoo Lee, and Dongho Won | FGIT 2011, LNCS 7105 | 353-360 | 2011.12.07 |
135 | Cryptanalysis of the User Authentication Scheme with Anonymity | Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho Won | FGIT 2011, LNCS 7105 | 285-292 | 2011.12. |
134 | Protection Profile of Personal Information Security System | Hyun-Jung Lee, Kwangwoo Lee, Dongho Won | Proc. of IEEE SPIoT 2011, The 2011 IEEE International Workshop on Security and Privacy in Internet of Things, Changsha, China | | 2011.11.16 |
133 | An Improved Protection Profile for Multifunction Peripherals in Consideration of Network Separation | 이창빈, 이광우, 박남제, 원동호 | ITCS Springer Verlag, LNEE 107 | 211-219 | 2011.10.20 |
132 | An Improved User Authentication Scheme for Wireless Communications | 전웅렬, 김지연, 남정현, 이영숙, 원동호 | ITCS Springer Verlag, LNEE 107 | 203-210 | 2011.10.20 |
131 | Construction of a Privacy Preserving Mobile Social Networking Service | 정재욱, 김학현, 유재성, 이창빈, 김승주, 원동호 | ITCS Springer Verlag, LNEE 107 | 251-261 | 2011.10.20 |
130 | A Study on the Development of Security Evaluation Methodology for Wireless Equipment | 박남제, 이창빈, 이광우, 원동호 | ITCS Springer Verlag, LNEE 107 | 231-239 | 2011.10.20 |
129 | Security Improvement to a Authentication Scheme for Session Initiation Protocol | 이영숙, 김지연, 남정현, 원동호 | ITCS Springer Verlag, LNEE 107 | 221-230 | 2011.10.20 |
128 | A Security Weakness in Tseng et al Key Agreement Protocol | Hyunsik Yang, Kwangwoo Lee, Changbin Lee, Jin Kwak, Dongho Won | Proc. of JWIS 2011, The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan | 32. e-file (10p) | 2011.10.05 |
127 | Security Analysis of Smartphone Music Streaming Services | Huiseung Jeon, Kwangwoo Lee, Changbin Lee, Dongho Won | Proc. of JWIS 2011, The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan | 26. e-file (10p) | 2011.10.05 |
126 | A Mobile based Anti-Phishing Authentication Scheme using QR code | Kyeongwon Choi, Changbin Lee, Woongryul Jeon, Kwangwoo Lee and Dongho Won | ICMIC 2011, September 26-28 | 109-113 | 2011.09.26 |
125 | An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard | Changbin Lee,Kwangwoo Lee, Dongho Won | ICHIT LNCS 6935 | 488-495 | 2011.09.22 |
124 | Malware Variant Detection and Classification Using Control Flow Graph | Donghwi Shin, Dongho Won | ICHIT Springer Verlag CCIS 206 | 174-181 | 2011.09.22 |
123 | An Authenticated Key Exchange to improve the Security.of Shi et al.and Kim et al.'s Protocols | 김미진, 권창영, 원동호 | Proc. of WISM 2011, Springer-Verlag, LNCS 6987, Taiyuan, China | 259-270 | 2011.09. |
122 | Cryptanalysis of Robust Multi-Server Authentication Scheme | Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won | Proc. of CCSIE 2011, London | 216-219 | 2011.07.25 |
121 | Study of Information Security Pre-Diagnosis Model for New IT Services | Wanseok Yi, Kwangwoo Lee, Jin Kwak, and Dongho Won | Proc. of WORLDCOMP 2011, July 18-21, 2011, Las Vegas | | 2011.07.18 |
120 | Cryptanalysis to a Remote User Authentication Sever Using Smart Cards for Multi-Sever Enviroment | 이영숙, 김지연, 원동호 | HCII 2011 LNCS 6771 | 321-329 | 2011.07.09 |
119 | Analysis of Content Filtering Software | 전웅렬, 이영숙, 원동호 | HCII 2011 LNCS 6771 | 548-557 | 2011.07.09 |
118 | A Practical Analysis of Smartphone Security | 전웅렬, 김지연, 이영숙, 원동호 | HCII 2011 LNCS 6771 | 311-320 | 2011.07.09 |
117 | Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group | Junghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, and Dongho Won | HCII 2011, LNCS 6771, Orlando, USA, July 09-14, 2011, | 339-348 | 2011.07.09 |
116 | Security Improvement on a Group Key Exchange Protocol for Mobile Networks | 남정현, 이광우, 백주련, 박우진, 원동호 | ICCSA 2011 NCS 6785 | 123-132 | 2011.06.20 |
115 | An Improved Protocol for Server-Aided Authenticated Group Key Establishment | 남정현, 백주련, 이병희, 이광우, 원동호 | ICCSA 2011 NCS 6785 | 437-446 | 2011.06.20 |
114 | An Improved Key Establishment Scheme for Wireless Sensor Network | Jaesung Yoo, Yunho Lee, Dongho Won | CFI 2011, Seoul, Korea | 70-71 | 2011.06.13 |
113 | Analysis on Vulnerability of Home Healthcare Medical Devices and Development of Protection Profile based on Common Criteria Version 3.1 | Changwhan Lee, Kwangwoo Lee, Seungjoo Kim and Dongho Won | Proc. of CNSI 2011 | 240-247 | 2011.05.23 |
112 | An Analysis of Multi-Function Peripheral with a Digital Forensics Perspective | Kwangwoo Lee, Changbin Lee, Namje Park, Seungjoo Kim and Dongho Won | Proc. of CNSI 2011 | 252-257 | 2011.05.23 |
111 | Analysis and Countermeasures of Security Vulnerability on Portal Sites | Kyoungju Kwak, Kwangwoo Lee, Dongho Won and Seungjoo Kim | Proc. of ICUIMC 2011 | 2-5 | 2011.02.28 |
110 | An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity | Mijin Kim, Seungjoo Kim, and Dongho Won | Springer-Verlag, LNCS 6318 | 244-253 | 2010.10. |
109 | Automated DCI Compliance Test System for Digital Cinema Entities | Taehyun Kim, Dongho Won, Kwangwoo Lee, Hogab Kang, Seungjoo Kim | Proc. of IEEE NCM 2010 | 434-439 | 2010.08.16 |
108 | A Secure Key Management Scheme for Multi-Agent base Sensor Cloud Computing in Wireless Network | Dongbum Lee, Kwangwoo Lee, Seungjoo Kim, Woong Go, Dongho Won, Jin Kwak | The 5th Joint Workshop on Information Security | 272-286 | 2010.08.05 |
107 | A Trustworthy ID Management Mechanism in Open Market | Inkyung Jeun and Dongho Won | ISPEC Lecture Note in Computer Science 6047 | 229-240 | 2010.05.12 |
106 | Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards | Youngsook Lee, Hyungkyu Yang, and Dongho Won | ISPEC Lecture Note in Computer Science 6047 | 377-385 | 2010.05.12 |
105 | A proposal of appropriate evaluation scheme for exchangeable CAS(XCAS) | Yu-na Hwang, Hanjae Jeong, Sungkyu, Cho, Dongho Won and Seungjoo Kim | ISPEC Lecture Note in Computer Science 6047 | 217-228 | 2010.05.12 |
104 | Protection Profile for Secure E-Voting Systems | Kwangwoo Lee, Yunho Lee, Dongho Won and Seungjoo Kim | ISPEC Lecture Note in Computer Science 6047 | 388-397 | 2010.05.12 |
103 | A Study on Comparative Analysis of the Information Security Management Systems | Heasuk Jo, Seungjoo Kim, and Dongho Won | ICCSA2010, LNCS 6019 | 510-519 | 2010.03.23 |
102 | Security Analysis on Commercial Online Music Streaming Service and ountermeasures | Sangshik Lee, Donghyun Choi, dongho Won Seungjoo Kim | ICUIMC 2010, Sungkyunkwan University BK 21 | 408-414 | 2010.01.15 |
101 | Weakness and Improvements of Kuo-Lee's One-time Password Authentication Scheme | Mijin Kim, Byunghee Lee, Seungjoo Kim, and Dongho Won | ccis springer | 421-430 | 2009.12.12 |
100 | Enhancing of a Password-Based Authentication Scheme Using Smart Cards | Youngsook Lee, and Dongho Won | OTM 2009, LNCS 5871 | 879-886 | 2009.11.01 |
99 | A Practical Approach to a Reliable Electronic Election | Kwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho Won | ICCSA 2009 Springer-Verlag, LNCS 5593 | 191-203 | 2009.06.29 |
98 | Smart card based AKE Protocol using Biometric Information in Pervasive Computing Environment | Wansuck Yi, Seungjoo Kim, Dongho Won | ICCSA 2009 Springer-Verlag, LNCS 5593 | 182-190 | 2009.06.29 |
97 | Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-Server Environment | Youngsook Lee, Dongho Won | ICCSA 2009 Springer-Verlag, LNCS 5593 | 164-172 | 2009.06.22 |
96 | Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key | Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won | ICCSA 2009 Springer-Verlag, LNCS 5593 | 204-211 | 2009.06.22 |
95 | Cipher Suite Setting Problem of SSL Protocl and It's Solution | Yunyoung Lee, Soonhaeng Hur, Dongho Won and Seungjoo Kim | FINA 2009 UK | 140-146 | 2009.05.26 |
94 | Security Specification for Conversion Technologies of Heterogeneous DRM Systems | Junghyun Nam, Juryon Paik, Hyun-Kyu Kang, Ung Mo Kim, and Dongho Won | ISPEC 2009, LNCS 5451 | 159-170 | 2009.04.13 |
93 | Protection Profile for Connected Interoperable DRM Framework | Donghyun Choi, Sungkyu Cho, Dongho Won and Seungjoo Kim | WISA 2008, Lecture note in computer science 5379 | 320-332 | 2009.03.01 |
92 | New Identity Management Scheme and Its Formal Analysis | Jeonghoon Han, Hanjae Jeong, Dongho Won Seungjoo Kim | ICT 08 vol 37, Dubi United Arab Emirates | 617-623 | 2009.01.28 |
91 | Off-line Password-guessing Attack to Yang's and Huang's Authentication Schemes | Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won | NCM 2009 : 5th international conference on INC, IMS, and IDC, (Seoul Korea) | 618-621 | 2009. |
90 | How to Trust DRE Voting Machines Preserving Voter Privacy | Yunho Lee, Seungjoo Kim and Dongho Won | ICEBE 2008 | 302-307 | 2008.10.22 |
89 | Security Weakness in Chang and Wu‘s Key Agreement Protocol for a Multi-Server Environment | Youngsook Lee and Dongho Won | ICEBE 2008 | 308-314 | 2008.10.22 |
88 | Government Information Security System with ITS Product Pre-qualification | Wan S.Yi, Dongbum Lee, Jin Kwak, Dongho Won | JWIS 09 | | 2008.08.06 |
87 | Secure Authentication Protocol with Biometrics in an M-Commerce Environment | Wan S.Yi, Woong Go, Dongho Won Jin Kwak | JWIS 09 | | 2008.08.06 |
86 | Multilateral Approaches to the Mobile RFID Security Problem Using Web Service | Namje Park, Youjin Song, Dongho Won and Howon Kim | Proc. of APWeb 2008, The 10th Asia Pacific Web Conference, Springer-Verlag, LNCS 4976 | 331-341 | 2008.04.26 |
85 | Enforcing Security in Mobile RFID Networks: Multilateral Approaches and Solutions | Namje Park, Howon Kim, Seungjoo Kim, and Dongho Won | Proc. of IEEE/IFIP NOMS 2008, The 11th IEEE/IFIP Network Operations&Management | 999-1002 | 2008.04.07 |
84 | Policy and Role based Mobile RFID User Privacy Data Management System | Namje Park, Youjin Song, and Dongho Won | Proc. of IEEE/IFIP NOMS 2008, The 11th IEEE/IFIP Network Operations & Management | 1003-1007 | 2008.04.07 |
83 | Vulnerabilities in a Remote Agent Authentication scheme Using Smart Cards | Youngsook Lee, Junghyun Nam, and Dongho Won | Springer verlag, LNAI 4953 | 850-857 | 2008.03.26 |
82 | Vulnerability Analysis of Secure USB Flash Drives | Hanjae Jeong, Younsung Choi, Woongryel Jeon, Yunho Lee, Seungjoo Kim, and Dongho Won | IEEE International Workshop on Memory Technolgy, Design, and Testing | 61-64 | 2007.12.03 |
81 | Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation | Keunwoo Rhee, Jin Kwak, Wan S.Yi, Chanho Park Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, and Dongho Won | ICHIT 2006, LNCS 4413 | 607-616 | 2007.12. |
80 | Infringing Key Authentication of an ID-Base Group Key Exchange Protocol Using Binary Key Trees | Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won | KES 2007, LNAI 4692 | 672-679 | 2007.09. |
79 | Security Analysis on the Authentication Mechanics of Korean Popular Messengers | Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won | HCI, LNCS 4554 | 547-552 | 2007.08.20 |
78 | Secure Mobile Contrnt Delivery Using Dynamic Group Key Agreement with Batch Verification | Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won | ICCSA, LNCS 4706 | 996-1007 | 2007.08. |
77 | An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack | Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, and Dongho Won | ATC 2007, LNCS 4610 | 135-145 | 2007.07.11 |
76 | Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting | Youngsook Lee, Junghyun Nam, Jin Kwak, and Dongho Won | KES international Symposium, KES-AMSTA 2007, LNAI 4496 | 616-625 | 2007.06.01 |
75 | A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain | Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho Won | KES international Symposium, KES-AMSTA 2007 LNAI 4496 | 1007-1016 | 2007.06.01 |
74 | Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity | Junghyun Nam, Juryon Paik, Ung Mo Kim, and Dongho Won | ACNS 2007, LNCS 4521 | 158-176 | 2007.06. |
73 | Mobile P2P group communication Protocol for Confidence and Anonymity | Sungjin Lee, Seokhyun Jang, Yongwook Kim, Donghyun Choi, Seungjoo Kim, Dongho Won | The First International Conference on Ubiquitous Information Management and Communication | 166-174 | 2007.02.07 |
72 | Analysis of Composed TOE in the common criteria | Hanjae Jeong, Kwangwoo Lee, Seungjoo Kim, and Dongho Won | The First International Conference on Ubiquitous Information Management and Communication | 500-504 | 2007.02.07 |
71 | An Efficient and Secure License Sharing Scheme for Authorized domain DRM | Donghyun Choi, Yunho Lee, Seungjoo Kim, Dongho Won | The 2nd International Joint Workshop on Information Security and It's Application | 100-111 | 2007.02.07 |
70 | A Protection Profile for the Access Control Based Database Security System in Sniffing Model | Woongryul Jeon, Heauk Jo, Yunho Lee, Seungjoo Kim, Dongho Won | Proceeding of IJWISA 2007 | 150-160 | 2007.02.07 |
69 | A Study on the Security Specification for Conversion Technologies of Heterogeneous DRM System | Heasuk Jo, Kyongho Son, Yunho Lee, Seungjoo Kim, Dongho Won | Proceeding of IJWISA 2007 | 170-181 | 2007.02.07 |
68 | A Study On Advanced Zoning Method of SAN | Haelahng Choi, Hanjae Jeong, Byunghee Lee, Seungjoo Kim, and Dongho Won | Proceeding of IJWISA 2007 | 236-241 | 2007.02.07 |
67 | Cleaning Policy for Secure Deletion of Data from Flash Memory in Mobile Phone | Woongryul Jeon, Heasuk Jo, Seungjoo Kim, Dongho Won | Proceeding of IJWISA 2007 | 251-255 | 2007.02.07 |
66 | Efficient Password-Authenticated Key Exchange Based on RSA | Sangjoon Park, Junghyun Nam, Seungjoo Kim and Dongho Won | RSA conference, LNCS 4377 | 309-323 | 2007.02.05 |
65 | The Threat Modeling and Choosing a Better Countermeasure | Yunyoung Lee, Donghwi Shin, Kwangwoo Lee, Seungjoo Kim, and Dongho Won | The First International Conference on Ubiquitous Information management and Communication | 174-184 | 2007.02. |
64 | A Recovery Method of the Deleted Certificate and the Privacy-Key Encryption Password using Commercial Forensic Tools | Younsung Choi, Younggyo Lee, Junghyun Nam, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won | The 6th International Conference on Application and Principles of Information Science | 201-204 | 2007.01.23 |
63 | Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network | Namje Park, Seungjoo, and Dongho Won | AWIC' 2007 Advances in Soft Computing 43. Springer | 278-283 | 2007. |
62 | Group Key Agreement Protocol Among Mobile Devices in Different Cells | Jeeyeon Kim, Seungjooo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won | ISPA 2006, LNCS 4331 | 1090-1097 | 2006.12.04 |
61 | An Efficient Dispute Resolving Method for Digital Images | Yunho Lee, Heasuk Jo, Seungjoo Kim and Dongho Won | OTM Confederated International Workshops and Posters, LNCS 4277 | 331-341 | 2006.11.01 |
60 | Security enhancement of a remote user authentication scheme using smart cards | Youngsook Lee, Junghyun Nam, Dongho Won | OTM Confederated International Workshops and Posters, LNCS 4277 | 508-516 | 2006.11.01 |
59 | Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services | Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won and Howon Kim | KES 2006, LNAI 4251 | 924-934 | 2006.10.09 |
58 | Limitations, Threats and Requirements in RFID System | Jin Kwak, Sangsoo Yeo, Seungjoo Kim, dongho Won and Kouichi Sakurai | JWIS 2006 | | 2006.09.20 |
57 | An RFID System Based MCLT System with Improved Privacy | Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim Seungjoo Kim Kouichi Sakurai, and Dongho Won | EUC 2006 Workshop SecUbiq LNCS 4097 | 579-590 | 2006.08.01 |
56 | Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts | Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho Won | IAVoSS Workshop On Trustworthy Elections Proceedings | 145-152 | 2006.06.29 |
55 | A Security and Privacy Enhanced Protectio Scheme Secure 900 MHz UHF RFID Reader on Mobile Phone | Namje Park, Haedong Lee, Howon Kim, and Dongho Won | 2006 IEEE Tenth International Symposium on Consumer Electronics ISEC 2006 (CD) | | 2006.06.28 |
54 | Privacy Enhanced Wireless Internet Platform for Secure UHF Mobile RFID | Namje Park, Howon Kim, Kyoil Chung, Dongho Won | PARA 06 | | 2006.06.18 |
53 | Information System Modeling for Analysis of Propagation Effects and Levels of Damage | InJung Kim, YoonJung Chung, YoungGyo Lee, Eul Gyu Im, and Dongho Won | Proc. of ICCSA 2006 Springer-Verlag, LNCS 3982 | 54-63 | 2006.05.07 |
52 | Enhancement of a Three-Party Verifier-Based Key Agreement Protocol without Using Public Keys | Youngsook Lee, Junghyun Nam, Seungjoo Kim, and Dongho Won | GESTS international Transactions on Computer Science and Engineering, Vol. 31, No.1 | | 2006.05.01 |
51 | The Plan and Tools for Vulnerability Testing in Information Software-Based Systems | Injung Kim, Younggyo Lee and Dongho Won | Korea Information Processing Society IJIPS | 75-78 | 2006.01. |
50 | 可認證對話密鍵同意協議 | 于萍, 郭鎭, 金昇柱, 元東豪 | 信息安全與通信 保密 138 號 | 95-100 | 2005.06. |
49 | Dynamic Group Key Exchange over High Delay Networks | Junghyun Nam, Sungduk, Seungjoo Kim, and Dongho Won | Proc. of ISPC COMM. 2004 International Scientific-Practical conference on Communication 2004 | | 2004.08.22 |
48 | A Study on Risk Modeling over Information and Communication Infrastructure, | Injung Kim, Yoonjung Jung, Joogil Park, and Dongho Won | Proceeding of The 2004 International Conference on Security and Management(SAM2004) | | 2004.06. |
47 | A Study on a New Password based Key Distribution Protocol using The Server's Master Key Enhanced Privacy Authentication Combining Authentication Approaches in Wireless Environments | Dongkyu Won Jin Kwak, Hyungkyu Yang, Dongho Won | IEICE Proceeding of the 2004 Symposium on Cryptography and Information Security | 429-433 | 2004.01.27 |
46 | Enhanced Privacy Authentication Combining Authentication Approaches in Wireless Environments | Jinwoo Lee, Kieon Song, Jin Kwank, Hyungkyu Yang, Dongho Won | IEICE Proceeding of the 2004 Symposium on Cryptography and Information Security | 921-926 | 2004.01.27 |
45 | Real-time Certificate Validation Service by Client’s Selective Request. | Jin Kwak, Seungwoo Lee, Soohyun Oh, Dongho Won | Intelligent Systems Design and Applications. Springer Berlin Heidelberg | 207-218 | 2003. |
44 | Delegated certificate validation model applicable to the wireless pki | Jin Kwak, SeungWoo Lee, KyungJin Kim, DongHo Won | WSEAE Transactions on Communications | 55-60 | 2002.10. |
43 | The password-based key exchange protocol using a password-hardening protocol | Sangman Ahn, Soohyun Oh,Dongho Won | WSEAS Information Security | 146-149 | 2002.10. |
42 | Efficient Key Agreement Protocol using Proxy Server for Wireless communication | Soohyun Oh, Jin Kwak, Sangman Ahn, Dongho Won | WSEAS Information Security | 244-249 | 2002.10. |
41 | Real-time Certificate Status Validation Model with CSIProvider | Jin Kwak, Kyung-Jin Kim, Soo-Hyun Oh, Dong-Ho Won and Hyung-Kyu Yang | WSEAE Transactions on Communications | 203-210 | 2002.07. |
40 | Practical Use of Key Agreement Protocols
Proceedings of the International Conference on Security and Management | Kyung-Jin Kim, Jin Kwak, and Dong-Ho Won | Proceedings of the International Conference on Security and Management, SAM '02 | 120-126 | 2002.06.24 |
39 | How to Buy Digital Contents Anonymously in E-Commerce, | Yang-Kyu Lim, Ok-Hyun Ha, Chang-Hoon An, and Dong-Ho Won | Proceedings of the International Conference on Security and Management, SAM '02 | 451-457 | 2002.06.24 |
38 | Certificate Validation Service Providing Selective Request Information | Jin Kwak, SeungWoo Lee, KyungJin Kim, SungDuk, Kim, and DongHo Won | Proceedings of the International Conference on Security and Management, SAM '02 | 465-470 | 2002.06.24 |
37 | How secure are the Girault's Self-certified Public-key based Key agreement Protocols against Active attacks | Soo-Hyun Oh, Kyung-Jin Kim, Kyung-Ah Shim, M.Mambo, and Dong-Ho Won | Symposium on Cryptography and Information Security (SCIS), IEICE | 423-428 | 2002.01.29 |
36 | A Study on the Security of Key Agreement Protocol based on Asymmetric techniques against Passive attack | Sang-Man Ahn, Bo-Yeon Song, M.MamBo, H.Shizuya, Dong-Ho Won | Symposium on Cryptography and Information Security (SCIS), IEICE | 955-960 | 2002.01.29 |
35 | Improvement of Probabilistic Public Key Cryptosystem Using Discrete Logarithm | Dug-Hwan Choi, Seungbok Choi and Dongho Won | ICISC KIISC | 91-100 | 2001.12.07 |
34 | An efficient Key Recovery system suitable for PKI with multiple escrow agents | Hui-Jong Yu, Hee-Bon Choi, Hyungon Kim, Dong-Ho Won | WISA 2001 | 375-362 | 2001.09.13 |
33 | A Secure Mobile E-Commerce Digital Contents Protocol based Wireless Application Protocol | Yangkyu Lim, Sangjin Kook and Dongho Won | ASW, 2001 | 213-221 | 2001.07.25 |
32 | The Improvement of the 3-pass Password-Based Key Exchange Protocol | H.K.Lee, J.H.Nah, H.S.Jo, D.H.Won | CISC '99“, Proceedings of International Conference on Internet Computing IC'2001 | 897-903 | 2001.06.25 |
31 | Forward-Secure Commercial Key Escrow Systems | Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sangjoon Park and Dongho Won | IEEE Computer Society | | 2001.06.22 |
30 | A Flexible Key Recovery System Integrated with Key Distribution | Joonsuk Yu, Soohyun Oh, Jeongneyo Kim, Kyoil Chung and Dongho Won | ISE'2001 Proceeding of the international symposium on information system and engineering | 444-450 | 2001. |
29 | Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributor | Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won | Korea Institute of Information Security and Cryptology, ICISC 2000 | | 2000.12.08 |
28 | An Efficient Satellite CAS Using Password-Based Protocol | Youngsoo Kim, Joonsuk Yu, Dongho Won | The association for intelligent machinery | 607-611 | 2000.03.03 |
27 | Digital Watermarking and Practical Distribution Protocol for Digital Contents Copyright Protection | Jongmin Jeon, Byungman Lee, Kyungkook Kim, and Dongho Won | KIISC, proceedings of WISA | | 2000. |
26 | The authentication scheme for collaborative multimedia framework based watermaking | Kyungkug Kim, Joogul Sim, Dongho Won | IEEE Signaling Chapter, Singapore ICICS '99 | | 1999.12.07 |
25 | The authentication over watermarking with public key applied to collaborative multimedia framework | Kyungkug Kim, Jongmin Jun, Dongho Won | IEEE Malaysia | | 1999.11. |
24 | The authentication scheme involving participants of collaborative multimedia framework based conference | Kyungkug Kim, Dongwook Cho, Dongho Won | The 1999 International Technical Conference on Circuits / Systems, Computers and communications (Janan) | 1039-1042 | 1999.07.13 |
23 | An Efficient Proxy-Authentication Scheme for Mobile Environment | Boyoung Lee, Miri Joo, Yeonyi Choi and Dongho Won | Cryptographic Technigues & E-Commerce '99 | 176-178 | 1999.07.07 |
22 | Verifiable self-certified public keys | Seungjoo Kim, Soo-Hyun Oh, and Dongho Won | Workshop on Coding and Cryptography, INRIA | 139-148 | 1999.01.11 |
21 | One-time self-certified public keys, revisited | Seungjoo Kim, Soo-Hyun Oh, Kyung-Guk Kim and Dongho Won | ICISC '98 | 59-70 | 1998.12. |
20 | An one-pass mutual authentication key agreement scheme using nominative signatures with message recovery | In Sook Lee and Dong Ho Won | SEACOMM'98 South east communications conference ' 98 | | 1998.08. |
19 | An Improved Single Term Off-Line Coins | Youngchul Choi, Hyungkyu Yang and Dongho Won | 1997 Korea-Japan JW-ISC | 89-94 | 1997.09. |
18 | ID-Based Multisignature Scheme Based on High Residuosity Problem | Boyoung Lee, Seungjoo Kim and Dongho Won | 1997 Korea-Japan JW-ISC | | 1997.09. |
17 | The Problem of Single Term Off Coins and Countermeasures | Youngchul Choi, Seungjoo and Dongho Won | IEICE and KITE(Okinawa Japan) | | 1997.07. |
16 | Zero knowledge nominative signature | S.J.Kim, S.J.Park, D.H.Won | Pragocrypt'96 | 380-392 | 1996.10. |
15 | A Paradoxical ID-Based Key Distribution Prdtocol for Moble Communication | Yeon Yi Choi, Seoung Joo Kim, Sung Jun Park and Dong Ho Won | Systems KITE IXICE and IEEE | 412-415 | 1996.07. |
14 | Verifiable secret sharing and multiparty protocol in distributed systems | HK Yang, JY Kim, CY Kwon, DH Won | 1995 IEEE Singapore International Conference on network / International Conference on Information Engineering | 637-643 | 1995.07. |
13 | A Provably entrusted undeniable signature | Sung Jun Park, Tae Hoon Kim, Young Hwa An, Dong Ho Won | 1995 IEEE Singapore International Conference on network / International Conference on Information Engineering | 644-648 | 1995.07. |
12 | An entrusted undeniable signature | S.J.Park, K.H.Lee, D.H.Won | 1995 Japan-Korea joint workshop on information security and cryptology | 129-126 | 1995.01. |
11 | A practical group signature | S.J.Park, I.S.Lee, D.H.Won | 1995 Japan-Korea joint workshop on information security and cryptology | 127-133 | 1995.01. |
10 | A Secure Multiway Election Scheme | Sungjun Park, Boyoung Lee, Dongho Won | Twelfth International Conference on Computer Communication | 426-431 | 1995. |
9 | A Practical Identity-based Group Signature | Sungjun Park , Dongho Won | The 1995 International Conference on Electronics, Information and Communication | 64-67 | 1995. |
8 | Nomiative Signature | Seungjoo Kim, Sungjun Park and Dongho Won | The 1995 International Conference on Electronics, Information and Communication | 68-71 | 1995. |
7 | An efficient Sequential Multisigature Scheme | Sungduk Kim, Hyungkyu Yang and Dongho Won | The 1995 International Conference on Electronics, Information and Communication | 72-75 | 1995. |
6 | Efficient TCM Decoding Algorithm for Satellite Communications | Ji Won Jung and Dongho Won | 1995 joint technical conference on circuit / systems, computer and communications (Kumamoto, Japan) | 273-277 | 1995. |
5 | A Probabilistic Encryption Using Very High Residuosity and Application | Sung Jun Park, Bo Young Lee, Dong Ho Won | IEEE 1995 Global Telecommunications Conference | 1179-1182 | 1995. |
4 | A Generalization of Public Key Residue cryptosystem | Sung-Jun Park, Dong-Ho Won | 1993 KOREA-JAPAN JOINT WORKSHOP ON INFORMATION SECURITY AND CRYPTOLOGY, Technical Report of IEICE, SEC93-54 | 187-191 | 1993.10. |
3 | Two Round ZKIP of Knowledge for SAT and its Applications | Hyung-Kyu Yang, Ji-Won Jung, Dong-Ho Won | IEEE Singapore International Conferance on Information, Engineering‘93 | 512-517 | 1993.09. |
2 | A Study on TCM Decoder Performance for PSK, PAM,QAM in the Gaussian Impulsive Noise Channel | Ji-Won Jung, Hyung-Kyu Yang, Dong-Ho Won | IEEE Singapore International Conference on Information Engineering‘93 | 791-795 | 1993.09. |
1 | A study on the efficient zero knowledge message authentication secure against chosen ciphertext attack | Hyung Kyu Yang, Kyung Shin Kim, Dong Ho Won | 1993 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS | 219-224 | 1993.08. |