30 | Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme | Jongho Moon, Donghoon Lee, Jaewook Jung and Dongho Won | International Journal of Network Security | Vol.19, No.6 | 1052-1060 | 2017.11.01 |
29 | Software Birthmark Method Using Combined Structure–Based and API–Based | Donghoon Lee, Dongwoo Kang, Jiye Kim, and Dongho Won | Journal of Software | Vol 12. No.2 | 138-144 | 2017. 02. |
28 | An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card | Jongho Moon, Jiseon Yu, Younsung Choi and Dongho Won | Journal of Computers | Vol. 27, No, 4 | 85-93 | 2016.12.16 |
27 | An Improvement of User Authentication Framework for Cloud Computing | Jongho Mun, Jiye Kim and Dongho Won | Journal of Computers | Vol.11, No.6 | 446-454 | 2016.11. |
26 | Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System | Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won | International Journal of Information and Education Technology | Vol.5, No.7 | 538-542 | 2015.07.30 |
25 | An Efficient Categorization of the Instructions Based on Binary Excutables for Dynamic Software Birthmark | Donghoon Lee, Younsung Choi, Jaewook Jung, Jiye Kim, and Dongho Won | International Journal of Information and Education Technology | Vol.5, No.8 | 571-576 | 2015.07.30 |
24 | Security weaknesses of a Timestamp-Based User Authentication Scheme with Smart Card | Jaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, and Dongho Won | International Journal of Information and Education Technology | Vol.5, No.7 | 553-556 | 2015.07.30 |
23 | A novel smart card-based remote user authentication mechanism | Deborah Uwera, and Dongho Won | Computer Science and Information Technology | Vol.3, No.4 | 117-121 | 2015.05. |
22 | Password-only authenticated three-party key exchange proven secure against insider dictionary attacks | Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won | The Scientific World Journal | Vol.2014 | 1-15 | 2014.09.08 |
21 | Malware Variant Analysis Algorithm with Control Flow Graph considering Instuction Semantic of Executable File | Donghwi Shin, Kwangwoo Lee, Dongho Won | Information | | 1817-1824 | 2014.05. |
20 | A Practical Anonymous Electronic Prescription Scheme Based on RSA Cryptosystem | Chanjoo Chung, Kwangwoo Lee, Jungmee Yun, Namje Park, Dongho Won | Information | | 1809-1815 | 2014.05. |
19 | Lightweight anonymous authentication scheme with unlinkability in global mobility networks | Youngseok Chung, Seokjin Choi, and Dongho Won | Journal of Convergence | Vol.4, No.4 | 23-29 | 2013.12. |
18 | Survey of Web Search Engines: Classifications, Characteristics and Effectiveness | 백주련, 남정현, 김전환, 김응모, 원동호 | International Journal do Information Processing and Management (IJIPM) | Vol.4, No.5 | 16-25 | 2013.07. |
17 | Decentralized Social Network Service Using the Web Hosting Server for Privacy Preservation | Yoonho Nam, Changhoon Lee, Youngman Jung, Woongryul Jeon, and Dongho Won | Journal of Computer Science and Information | Volume 6, Issue1 | 6-10 | 2013.02. |
16 | Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols | Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won | International Journal of Security and Its Applications | Vol.7, No.2 | 47-57 | 2013. |
15 | Study on a Secure Remote User Authentication Scheme Using Smart Cards | Jin Qiuyan, Kwangwoo Lee and Dongho Won | International Journal of Security and Its Applications | Vol.7, No.2 | 105-116 | 2013. |
14 | Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea | Sanggsik Lee, Donghyun Choi, Dongho Won and Seungjoo Kim | Journal of Software | Vol.8, No.3 | 520-527 | 2013. |
13 | A Improved Secure Dynamic ID- based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology | Mijin Kim, Junghyun Nam and Dongho Won | International Journal of Security and Its Application | Vol.7, No.3 | 143-151 | 2013. |
12 | An Efficient User Authentication Scheme with Smart Cards for Wireless Communications | Woongryul Jeon, Yunho Lee, and Dongho Won | International Journal of Security and Its Application | | | 2013. |
11 | Privacy-enhanced social network service(SNS) | Hanjae Jeong, Changbin Lee, Jin Kwak,Changyoung Kwon, Seungjoo Kim and Dongho Won | Information: An International Interdisciplinary Journal | Vol.16, No.9(B) | 6905-6919 | 2013. |
10 | A Study on Differential User Authentication Scheme based on Client in Home Network | Changhoon Lee, Woongryul Jeon, Dongho Won | International Journal of Security and Its Applications | Vol.7, No.5 | 343-354 | 2013. |
9 | Weaknesses and Improvements of a One-time Password Authentication Scheme | 김미진, 이병희, 김승주, 원동호 | International Journal of Future Generation Communication and Networking | Vol.2, No.4 | 29-38 | 2009.12.30 |
8 | Unlinkable and Traceable EPC System for Consumer Privacy | Jin Kwak, Keunwoo Rhee, Seungjoo Kim, and Dongho Won | International Journal of Computer Science and Network Security | | 75-82 | 2005.12.31 |
7 | A Provably Secure Key Exchange Scheme for Dynamic Groups | Junghyun Nam, Woosuk Chang, Jeeyeon Kim, Seungoo Kim, Dongho Won | International Journal of Computer Science and Network | Vol.5, No.8 | 135-145 | 2005.08.31 |
6 | A Methode for Detecting the Exposure of an OCSP Responder's Private Key using One-Time Hash Value | Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won | International Journal of Computer Science and Network | Vol.5, No.8 | 179-186 | 2005.08.31 |
5 | Privacy-Enhanced Public-Key Certificate: How to Embed an Individual's Sensitive Information into a Certificate | Seungjoo Kim and Dongho Won | Trends in Mathematics ICMS | | 21-28 | 2005.06.30 |
4 | 移動通信環境下活用于電子商的 Proxy-Signcription 方式 | 吉文峰, 吳秀賢, 金賢珠, 元東豪 | 信息安全與通信保密 (China Information Security) | | 42-46 | 2002.04. |
3 | DRM Security Framework : ID-Based Approach for Content Super-Distribution | Jongmin Jeon, Sangjoon Park, Byunchun Kim and Dongho Won | IIIS | | | 2001.07.23 |
2 | On Proposition and Comparison of Trace Computation Methods in Finite Field GF(2**m) | Joogeol Sim, Changho Seo, Okyeon YI and Dongho Won | Far East Journal of Mathematical Sciences 3 (2001) | | 287-296 | 2001.06. |
1 | On the Security of the Okamoto-Tanaka ID-Based key Exchange Scheme against Active Attacks | Seungjoo Kim, Masahiro Mambo, Hiroki Shizuya and Dongho Won | JW-ISC, ISEC group of ICICE | | 191-198 | 2000.01.25 |