메뉴 건너뛰기

Welcome to ISG

NumberTitleAuthorPublisherVolumePageDate
30Improvement of Efficient and Secure Smart Card Based Password Authentication SchemeJongho Moon, Donghoon Lee, Jaewook Jung and Dongho WonInternational Journal of Network SecurityVol.19, No.61052-10602017.11.01
29Software Birthmark Method Using Combined Structure–Based and API–BasedDonghoon Lee, Dongwoo Kang, Jiye Kim, and Dongho WonJournal of SoftwareVol 12. No.2138-1442017. 02.
28An Improved Biometric-based Multi-server Authentication Scheme Using Smart CardJongho Moon, Jiseon Yu, Younsung Choi and Dongho WonJournal of ComputersVol. 27, No, 485-932016.12.16
27An Improvement of User Authentication Framework for Cloud ComputingJongho Mun, Jiye Kim and Dongho WonJournal of ComputersVol.11, No.6446-4542016.11.
26Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S SystemYounsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho WonInternational Journal of Information and Education TechnologyVol.5, No.7538-5422015.07.30
25An Efficient Categorization of the Instructions Based on Binary Excutables for Dynamic Software BirthmarkDonghoon Lee, Younsung Choi, Jaewook Jung, Jiye Kim, and Dongho WonInternational Journal of Information and Education TechnologyVol.5, No.8571-5762015.07.30
24Security weaknesses of a Timestamp-Based User Authentication Scheme with Smart CardJaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, and Dongho WonInternational Journal of Information and Education TechnologyVol.5, No.7553-5562015.07.30
23A novel smart card-based remote user authentication mechanismDeborah Uwera, and Dongho WonComputer Science and Information TechnologyVol.3, No.4117-1212015.05.
22Password-only authenticated three-party key exchange proven secure against insider dictionary attacksJunghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho WonThe Scientific World JournalVol.20141-152014.09.08
21Malware Variant Analysis Algorithm with Control Flow Graph considering Instuction Semantic of Executable FileDonghwi Shin, Kwangwoo Lee, Dongho WonInformation1817-18242014.05.
20A Practical Anonymous Electronic Prescription Scheme Based on RSA CryptosystemChanjoo Chung, Kwangwoo Lee, Jungmee Yun, Namje Park, Dongho WonInformation1809-18152014.05.
19Lightweight anonymous authentication scheme with unlinkability in global mobility networksYoungseok Chung, Seokjin Choi, and Dongho WonJournal of ConvergenceVol.4, No.423-292013.12.
18Survey of Web Search Engines: Classifications, Characteristics and Effectiveness백주련, 남정현, 김전환, 김응모, 원동호International Journal do Information Processing and Management (IJIPM)Vol.4, No.516-252013.07.
17Decentralized Social Network Service Using the Web Hosting Server for Privacy PreservationYoonho Nam, Changhoon Lee, Youngman Jung, Woongryul Jeon, and Dongho WonJournal of Computer Science and InformationVolume 6, Issue16-102013.02.
16Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange ProtocolsJunghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho WonInternational Journal of Security and Its ApplicationsVol.7, No.247-572013.
15Study on a Secure Remote User Authentication Scheme Using Smart CardsJin Qiuyan, Kwangwoo Lee and Dongho WonInternational Journal of Security and Its ApplicationsVol.7, No.2105-1162013.
14Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in KoreaSanggsik Lee, Donghyun Choi, Dongho Won and Seungjoo KimJournal of SoftwareVol.8, No.3520-5272013.
13A Improved Secure Dynamic ID- based Remote User Authentication Scheme with Key Agreement using Symmetric CryptologyMijin Kim, Junghyun Nam and Dongho WonInternational Journal of Security and Its ApplicationVol.7, No.3143-1512013.
12An Efficient User Authentication Scheme with Smart Cards for Wireless CommunicationsWoongryul Jeon, Yunho Lee, and Dongho WonInternational Journal of Security and Its Application2013.
11Privacy-enhanced social network service(SNS)Hanjae Jeong, Changbin Lee, Jin Kwak,Changyoung Kwon, Seungjoo Kim and Dongho WonInformation: An International Interdisciplinary JournalVol.16, No.9(B)6905-69192013.
10A Study on Differential User Authentication Scheme based on Client in Home NetworkChanghoon Lee, Woongryul Jeon, Dongho WonInternational Journal of Security and Its ApplicationsVol.7, No.5343-3542013.
9Weaknesses and Improvements of a One-time Password Authentication Scheme김미진, 이병희, 김승주, 원동호International Journal of Future Generation Communication and NetworkingVol.2, No.429-382009.12.30
8Unlinkable and Traceable EPC System for Consumer PrivacyJin Kwak, Keunwoo Rhee, Seungjoo Kim, and Dongho WonInternational Journal of Computer Science and Network Security75-822005.12.31
7A Provably Secure Key Exchange Scheme for Dynamic GroupsJunghyun Nam, Woosuk Chang, Jeeyeon Kim, Seungoo Kim, Dongho WonInternational Journal of Computer Science and NetworkVol.5, No.8135-1452005.08.31
6A Methode for Detecting the Exposure of an OCSP Responder's Private Key using One-Time Hash ValueYounggyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho WonInternational Journal of Computer Science and NetworkVol.5, No.8179-1862005.08.31
5Privacy-Enhanced Public-Key Certificate: How to Embed an Individual's Sensitive Information into a CertificateSeungjoo Kim and Dongho WonTrends in Mathematics ICMS21-282005.06.30
4移動通信環境下活用于電子商的 Proxy-Signcription 方式吉文峰, 吳秀賢, 金賢珠, 元東豪信息安全與通信保密 (China Information Security)42-462002.04.
3DRM Security Framework : ID-Based Approach for Content Super-DistributionJongmin Jeon, Sangjoon Park, Byunchun Kim and Dongho WonIIIS2001.07.23
2On Proposition and Comparison of Trace Computation Methods in Finite Field GF(2**m)Joogeol Sim, Changho Seo, Okyeon YI and Dongho WonFar East Journal of Mathematical Sciences 3 (2001)287-2962001.06.
1On the Security of the Okamoto-Tanaka ID-Based key Exchange Scheme against Active AttacksSeungjoo Kim, Masahiro Mambo, Hiroki Shizuya and Dongho WonJW-ISC, ISEC group of ICICE191-1982000.01.25