130 | Can differential privacy practically protect collaborative deep learning inference for IoT? | Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang | Wireless Networks (IF : 3.165) | | | 2022.09.05 |
129 | MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks | Degefa Fikadu, Jihyeon Ryu, Hyoungshick Kim, Dongho Won | PLOS ONE (IF : 3.752) | Vol. 17, No. 5 | e0262696 | 2022.05.26 |
128 | SMASG: Secure Mobile Authentication Scheme for Global Mobility Network | Jihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho Won | IEEE ACCESS (IF : 3.367) | Vol. 10 | 26907-26919 | 2022.03.08 |
127 | Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme | Jihyeon Ryu, Dongwoo Kang, Dongho Won | IEEE ACCESS (IF : 3.367) | Vol. 10 | 15891-15910 | 2022.02.07 |
126 | Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment | Hakjun Lee, Dongwoo Kang, Youngsook Lee, Dongho Won | Wireless Communications and Mobile Computing (IF : 2.336) | | | 2021.7.27 |
125 | Lightweight User authentication scheme for roaming service in GLOMONET with privacy Preserving | Dongwoo Kang, Hakjun Lee, Youngsook Lee, Dongho Won | PLOS ONE(IF : 2.740) | Vol.16, No.2 | 1-40 | 2021.02.15 |
124 | A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems | Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim and Dongho Won | Sensors (IF:3.275) | Vol.20, No.24 | 1-25 | 2020.12.12 |
123 | Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication | Mijin Kim, Jongho Moon, Dongho Won, Namje Park | electronics (IF : 1.764) | Vol.9, No.5 | 1-16 | 2020.05.05 |
122 | A three-factor anonymous user authentication scheme for Internet of Things environments | Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee | Journal of Information Security and Applications (IF:1.537) | Vol.52, No.6 | 1-14 | 2020.04.08 |
121 | Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks | Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim, and Dongho Won | sensors(IF : 2.475) | Vol.18, Issue.12 | 1-18 | 2018.12.18 |
120 | Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity | Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, and Dongho Won | Security and Communication Networks (IF:0.904)
| Vol.2018 | 1-14 | 2018.06.20 |
119 | An improved anonymous authentication scheme for roaming in ubiquitous networks | Hakjun Lee, Donghoon Lee, Jongho Moon, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won | PLOS ONE(IF : 2.806) | Vol.13, No.3 | 1-33 | 2018.03.05 |
118 | Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User | Jongho Moon, Youngsook Lee, Jiye Kim, and Dongho Won | Security and Communication Networks (IF:0.806) | Vol.2017 | 1-13 | 2017.09.27 |
117 | Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems | Jaewook Jung, Jongho Moon, Dongho Won | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS(IF:0.452) | Vol.11, No.7 | 3720-3746 | 2017.07.31 |
116 | Security analysis and enhanced user authentication in proxy mobile IPv6 networks | Dongwoo Kang, Jaewook Jung, Donghoon Lee, Hyoungshick Kim, Dongho Won | PLOS ONE (IF:2.806) | Vol.12, No.7 | 1-20 | 2017.07.18 |
115 | Security enhanced multi-factor biometric authentication scheme using bio-hash function | Younsung Choi, Youngsook Lee, Jongho Moon and Dongho Won | PLOS ONE (IF:3.234) | Vol.12, No.5 | 1-32 | 2017.05.01 |
114 | Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks | Jongho Moon, Donghoon Lee, Youngsook Lee and Dongho Won | sensors (IF:2.033) | Vol.17, No.5 | 1-24 | 2017.04.25 |
113 | Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks | Jaewook Jung, Jongho Moon, Donghoon Lee and Dongho Won | sensors (IF:2.033) | Vol.17, No.3 | 1-21 | 2017.03.21 |
112 | An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System | Jaewook Jung, Dongwoo Kang, Donghoon Lee and Dongho Won | PLOS ONE (IF:3.234) | Vol.12, No.1 | 1-26 | 2017.01.03 |
111 | Improvement and Weakness of Zero-sum Defender against Return-Oriented Programming Attacks | Donghoon Lee, Jaewook Jung, Younsung Choi and Dongho Won | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (IF:0.40) | Vol.E99-A No.12 | | 2016.12. |
110 | An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks | Youngseok Chung, Seokjin Choi, Youngsook Lee, Namje Park and Dongho Won | sensors (IF:2.033) | Vol.16, No.10 | 1-22 | 2016.10.07 |
109 | An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks | Jaewook Jung, Jiye Kim, Younsung Choi and Dongho Won | sensors (IF:2.033) | Vol. 16, No. 8 | 1-30 | 2016.08.16 |
108 | Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain | Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi and Dongho Won* | Security and Communication Networks (IF:0.806) | Vol.9, Issue.11 | 1462-1476 | 2016.07.25 |
107 | API-Based Software Birthmarking Method Using Fuzzy Hashing | Donghoon lee, Dongwoo Kang, Younsung Choi, Jiye Kim and Dongho Won | IEICE TRANSACTIONS on Information and Systems (IF : 0.41) | Vol.E99-D, No.7 | 1836-1851 | 2016.07.01 |
106 | Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks | Jiye Kim, JonghoMoon, Jaewook Jung, and Dongho Won | Journal of Sensors (IF:0.712) | Vol.2016, Article ID 4393721 | 1-17 | 2016.06. |
105 | Forward Anonymity-Preserving Secure Remote Authentication Scheme | Hanwook Lee, Junghyun Nam, Moonseong Kim and Dongho Won | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS(IF: 0.561) | Vol.10, No.3 | 1289-1309 | 2016.03.31 |
104 | An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps | Jongho Moon, Younsung Choi, Jiye Kim and Dongho Won | Journal of Medical Systems (IF:2.213) | Vol40, No.3 | 1-11 | 2016.01.07 |
103 | Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction | Younsung Choi, Youngsook Lee and Dongho Won | International Journal of Distributed Sensor Networks (IF : 0.665) | Vol.2016, Article ID 8572410 | 1-16 | 2016.01.06 |
102 | An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards | Jongho Moon, Younsung Choi, Jaewook Jung, Dongho Won | PLOS ONE (IF:3.234) | vol.10, No.12 | 1-15 | 2015.12.28 |
101 | Performance and security enhanced authentication and key agreement protocol for SAE/LTE network | Fikadu B. Degefa, Donghoon Lee, Jiye Kim, Younsung Choi and Dongho Won | Computer Networks (IF:1.256) | | 1-19 | 2015.12.04 |
100 | Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE) | Hanwook Lee and Dongho Won | symmetry (IF:0.826) | vol.7, No.3 | 1587-1594 | 2015.09.02 |
99 | Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments | Youngseok Chung, Seokjin Choi, and Dongho Won | International Journal of Distributed Sensor Networks (IF:0.665) | Article ID 305785 | 1-14 | 2015.09.01 |
98 | Security requirement for mobile virtualization | Hyunjung Lee and Dongho Won | Asia Life Sciences (IF:0.075) | Supplement 11 | 217-228 | 2015.07.26 |
97 | The reusable vulnerability of signed package with the same certificate | Donghwi Shin, Jongsup Park, Chanam Park and Dongho Won | Asia Life Sciences (IF:0.075) | Supplement 11 | 587-602 | 2015.07.26 |
96 | Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation | Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han , Moonseong Kim, Juryon Paik, Dongho Won | PLOS ONE (IF:3.23) | Vol.10, No.4 | 1-21 | 2015.04.07 |
95 | An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting | Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won | IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (IF:0.226) | Vol.E98-A, No.1 | 424-427 | 2015.01.31 |
94 | Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting | Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Juryon Paik, Dongho Won | symmetry (IF:0.826) | Vol.7, No.1 | 105-124 | 2015.01.27 |
93 | Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property | Kyungho Son, Dongguk Han, Dongho Won | IEICE TRANSACTIONS on Communications (IF:0.326) | Vol.98, No.1 | 160-170 | 2015.01.01 |
92 | A provably-secure ECC-based authentication scheme for wireless sensor networks | Junghyun Nam, Moonseong Kim, Juryon Paik, Youngsook Lee, and Dongho Won | Sensors | Vol.14, No.11 | 21023-21044 | 2014.11.06 |
91 | A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols | Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won | Information Sciences | Vol.281 | 182-200 | 2014.10. |
90 | Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics | Younsung Choi, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung and Dongho Won | Scientific World Journal | Vol.2014 | 1-15 | 2014.09.08 |
89 | On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys | Junghyun Nam, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won | Scientific World Journal | Vol.2014 | 1-7 | 2014.09.01 |
88 | Association Rule Extraction from XML Stream Data for Wireless Sensor Networks | Juryon Paik, Junghyun Nam, Ung Mo Kim and Dongho Won | Sensors | Vol.14, No.7 | 12937-12957 | 2014.07.18 |
87 | Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography | Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam and Dongho Won | Sensors | Vol.14, No.6 | 10081-10106 | 2014.06.10 |
86 | Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data | Juryon Paik, Junghyun Nam, Ung Mo Kim, Dongho Won | Journal of Information Science and Engineering | Vol.30, No.3 | 787-817 | 2014.05.15 |
85 | Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model | Junghyun Nam, Kim-Kwang Raymond Choo, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim, Juryon Paik, and Dongho Won | Scientific World Journal | Vol.2014 | 1-11 | 2014.04.14 |
84 | Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks | Jiye Kim, Donghoon Lee, Woongryul Jeon, Youngsook Lee and Dongho Won | Sensors | Vol.14, No.4 | 6443-6462 | 2014.04.09 |
83 | Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols | Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik and Dongho Won | KSII TIIS | Vol.7, No.12 | 3244-3260 | 2013.12 |
82 | Threat modeling of a mobile device management system for secure smart work | Keunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo Park | Electronic Commerce Research | vol,13, No.3 | 243-256 | 2013.09. |
81 | Hybrid Key Management Architecture for Robust SCADA Systems | Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim | Journal of Information Science and Engineering | Vol.29, No.2 | 281-298 | 2013.03 |
80 | A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed | Junwon Lee, Jaeik Cho, Jung-Taek Seo, Taeshik Shon, Dongho Won | MONET | Vol.18, No.1 | 122-128 | 2013.02 |
79 | An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments | Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho Won | IEICE Transactions On Communications | Vol.95, No.5 | 1819-1821 | 2012.06.30 |
78 | A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards | Kyungho Son, Dong-Guk Han, Dongho Won | IEICE Transactions on Communication | Vol.95, No.5 | 1819-1821 | 2012.05.31 |
77 | Hybrid search engine: concept and framework | 남정현, 백주련, 김응모, 원동호 | Information-An International Interdisciplinary Journal | Vol.15, No.5 | 1863-1874 | 2012.05. |
76 | Security Weakness in Harn-Lin and Dutta-Barua Protocols for Group Ley Establishment | 남정현, 문영성, 백주련, 원동호 | KSII | Vol.6, No.2 | 751-765 | 2012.02.29 |
75 | A Practical and Secure Electronic Election System | Yunho Lee, Dongho Won | ETRI Journal | Vol.34, No.1 | 55-65 | 2012.02.28 |
74 | A Study on Security Management Service System for Wireless Network environment | 이대섭, 원동호 | Applied Mathematics & Information Science | Vol.6, No.1 | 209-220 | 2012.01. |
73 | Scalable Group Key Exchange for Securing Distributed Operating Systems | Junghyun Nam, Minkyu Park, Sangchul Han, Juryon Paik, and Dongho Won | Journal of Information Science and Engineering | Vol.28, No.5 | 829-855 | 2012. |
72 | Advanced Information Security Management Evaluation System | 조혜숙, 김승주, 원동호 | Transaction on Internet and Informations | Vol.5, No.6 | 1192-1213 | 2011.06.30 |
71 | A Secure and Efficient E-Will System Based on PKI | Kwangwoo Lee, Dongho Won, and Seungjoo Kim | Information-An International Interdisciplinary Journal, International Information Institute | Vol.14, No.7 | 2187-2206 | 2011.06.30 |
70 | Secure Data Deletion for USB Flash Memory | Byunghee Lee, Kyungho Son, Dongho Won and Seungjoo Kim | Journal of Information Science and Engineering | Vol.27, No.3 | 933-952 | 2011.05.31 |
69 | Secure and Efficient Code Encryption scheme Based on Indexed Table | 조성규, 신동휘, 조혜숙, 최동현, 원동호, 김승주 | ETRI Journal | Vol.33, No.1 | -70 | 2011.02.28 |
68 | Security Improvement on Wu and Zhu's Protocol for password-authenticated Group Key Exchange | 남정현, 백주련, 원동호 | IEICE transaction on fundamentals of electronics, communication and computer sciences | Vol.94, No.2 | 865-868 | 2011.02. |
67 | A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol | 남정현, 백주련, 원동호 | Information Science | Vol.181, No.1 | 234-238 | 2011.01.01 |
66 | Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol | Hanjae Jeong, Dongho Won and Seungjoo Kim | Journal of Information Science and Engineering | Vol.26, No.5 | 1845-1858 | 2010.09.30 |
65 | Towards trustworthy e-voting using paper receipts | Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim and Dongho Won | Computer Standards & interfaces(32) | | | 2010.06. |
64 | Efficient Secure Group Communications for SCADA | Donghyun Choi, Sungjin Lee, Dongho Won, and Seungjoo Kim | IEEE Trans. on Power Delivery | Vol.25, No.2 | 714-722 | 2010.04.30 |
63 | Enhancement of two-factor authenticated key exchange protocols in public wireless LANs | Yunho Lee, Seungjoo Kim, Dongho Won | An International Journal of Computers and Electrical Engineering (Elsevier) | Vol.36, No.1 | 213-223 | 2010.01.30 |
62 | Advanced Key Management Architecture for Secure SCADA for Secure SCADA Communications | Donghyun Choi, Hakman Kim, Dongho Won, and Seungjoo Kim | IEEE Transactions on Power Delivery | Vol.24, No.3 | 1154-1163 | 2009.06.30 |
61 | Fast Extraction of Maximal Frequent Subtrees Using Bits Representation | Juryon Paik, Junghyun Nam, Dongho Won, and Ung Mo Kim | Journal of information science and engineering | Vol.25, No.2 | 435-464 | 2009.03.01 |
60 | An Off-Line Dictionary Attack on a Simple Three-Part Key Exchange Protocol | Junghyun Nam, Juryon Paik, Hyun-Kyu Kang, Ung Mo Kim, and Dongho Won | IEEE Communication Letters | Vol.13. No.3 | 205-207 | 2009.03.01 |
59 | Security Enhancement to a Password-Authenticated Group Key Exchange Protocol for Mobile Ad-hoc Networks | Junghyun Nam, Juryon Paik, Ung Mo Kim,and Dongho Won | IEEE comm. Letters | Vol.12, No.2 | 127-130 | 2008.02. |
58 | Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks | Junghyun Nam, Juryon Paik, Ung Mo Kim, Dongho Won | Information sciences 177 Elsevier | | 5441-5467 | 2007.12.01 |
57 | Security weakness in a three-party pairing-based protocol for password authenticated key Exchange | Junghyun Nam, Youngsook Lee, Seungjoo Kim, and Dongho Won | Information Sciences (Elsevier) | Vol.177, No.6 | 1364-1375 | 2007.03.15 |
56 | Security Analysis of a Nounce-Based User Authentication Scheme Using Smart Cards | Junghyun Nam, Seungjoo Kim, Sangjoon Park, and Dongho Won | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (IF:0.40) | Vol.90, No.1 | 299-302 | 2007.01.01 |
55 | Group Key Exchange over Combined Wired and Wireless Networks | Junghyun Nam and Dongho Won | Journal of communications and networks | | 461-474 | 2006.12.31 |
54 | Security Analysis and Implementation Leveraging Globally Networked RFIDs | Namje Park, Seungjoo Kim, Dongho Won, and Howon Kim | PWC 2006, LNCS 4217 | | 494-505 | 2006.12.09 |
53 | Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol | Yunho Lee, Seungjoo Kim, and Dongho Won | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (IF:0.40) | | 2084-2087 | 2006.07.01 |
52 | A PKI System for Detecting the Exposure of a User’s Secret Key | Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho Won | Proc. of EuroPKI 2006 Springer-Verlag, LNCS 4043 | | 348-250 | 2006.06.19 |
51 | An efficient POP protocol based on the signcryption scheme for the WAP PKI | Sungduk Kim, Kyungjin Kim, Jaedong Jung, and Dongho Won | Proc. of EuroPKI 2006, Springer-Verlag, LNCS 4043 | | 223-232 | 2006.06.19 |
50 | Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model | YoonJung Chung, InJung Kim, Chulsoo Lee, Eul Gyu Im, and Dongho Won | Proc. of ICCSA 2006, Springer-Verlag, LNCS 3983 | | 777-786 | 2006.05.07 |
49 | Two Efficient and Secure Authentication Schemes Using Smart Cards | Youngsook Lee, Junghyun Nam, Seungjoo Kim, and Dongho Won | Proc. of ICCSA 2006, Springer-Verlag, LNCS 3984 | | 858-866 | 2006.05.07 |
48 | An Inter-Domain Key Agreement Protocol Using Weak Passwords | Youngsook Lee, Junghyun Nam, and Dongho Won | Proc. of ICCSA 2006 Springer-Verlag, LNCS 3982 | | 517-526 | 2006.05.07 |
47 | 2-Way Text Classification for Harmful Web Documents | Youngsoo Kim, T.Y Nam, Dongho Won | Proc. of ICCSA 2006,Springer-Verlag, LNCS 3981 | | 545-551 | 2006.05.07 |
46 | Confidence Value based Multi Levels of Authentication for Ubiquitous Computing Environments | He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, and Dongho Won | Proc. of ICCSA 2006 Springer-Verlag, LNCS 3981 | | 954-963 | 2006.05.07 |
45 | XML- Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing | Namje Park, Howon Kim, Kyoil Chung Sungwon Sohn, and Dongho Won | Proc. of ICCSA 2006 Springer-Verlag, LNCS 3984 | | 251-259 | 2006.05.07 |
44 | A Semantic Context-Aware Access Control in Pervasive Environments | Hyuk Jin Ko, Dong Ho Won, Dong Ryul Shin, Hyun Seung Choo, and Ung Mo Kim | Proc. of ICCSA 2006 Springer-Verlag, LNCS 3981 | | 165-174 | 2006.05.07 |
43 | Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Password | Junghyun Nam, Seungjoo Kim, and Dongho Won | IEICE Transaction on Fundamentals | Vol.89, No.1 | 213-218 | 2006.01.31 |
42 | Weakness in Jung et al.'s ID-Based Conferance Key Distribution Scheme | Junghyun Nam, Seungjoo Kim, and Dongho Won | IEICE Transaction on Fundamentals | Vol.89, No.1 | 209-212 | 2006.01.31 |
41 | WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment | Namje Park, Jin Kwak, Howon Kim, seungjoo Kim and Dongho Won | WBICSE 2006, Springer-Verlag, LNCS 3482 | | 741-748 | 2006.01.16 |
40 | Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols | Nam, Junghyun, Seungjoo Kim, and Dongho Won | Information Security Applications. Springer Berlin Heidelberg | | 1-9 | 2006. |
39 | XML-Based Digital Signature Accelerator in Open Mobile Grid Computing | Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, and Dongho Won | LNCS 3795 | | 323-333 | 2005.11.30 |
38 | XML-Based Digital Signature Accelerator in Open Mobile Grid Computing | Namje Park, Kiyoung Moon, Kyoil Chung, Seung, Dongho Won | Grid and Cooperative Computing GCC 2005 LNCS 3795 | | 323-333 | 2005.11.30 |
37 | Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV | Hyunjue Kim, Junghyun Nam Seungjoo Kim, and Dongho Won | 6th Pacific-Rim Conference on Multimedia LNCS 3768 | | 117-128 | 2005.11.13 |
36 | DDH-based group key agreement in a mobile environment | Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won | The journal of Systems and Software | Vol.78, No.1 | 73-83 | 2005.10.30 |
35 | XML-Based Security Acceleration Methods Supporting Fast Mobile Grid | Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won | EC-Web, LNCS 3590 | | 316-326 | 2005.08.21 |
34 | Secure Group Communications over Combined Wired and Wireless Networks | Junghyun Nam, Seungjoo Kim, and Dongho Won | TrustBus, 2005, LNCS 3592 | | 90-99 | 2005.08.21 |
33 | A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services | Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, and Yuliang Zheng | ICWE 2005 Springer Verlag, LNCS 3579 | | 191-196 | 2005.07.30 |
32 | Threshold Entrusted Undeniable Signature | Seungjoo Kim, and Dongho Won | International Conference on Information security and Cryptology, LNCS 3506 | | 195-203 | 2005.06.30 |
31 | RFID System with Fairness Within the Framework of Security and Privacy | Jin Kwak, Keunwoo Rhee, Soohyun Oh Seungjoo Kim, and Dongho Won | Security and Privacy in Ad-hoc and Sensor Network LNCS 3813 | | 142-152 | 2005.06.13 |
30 | EXit-B A New Approach for Extracting Maximal Frequent Subtrees from XML Data | Juryon Paik, Dongho Won, Farshad Fotouhi, and Ung Mo Kim | IDEAL 2005, Springer Verlag LNCS. 3578 | | 1-8 | 2005.06.08 |
29 | XKMS-Based Key Management for Open LBS in Web Services Environment | Namje Park, Howon Kim, Kyoil Chung, Dongho Won | Third International Atlantic Web Intelligence Conference AWIC 2005, LNAI 3528 | | 367-373 | 2005.06.06 |
28 | Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices | Junghyun Nam, Seungjoo Kim, and Dongho Won | IEEE Communications Letters | Vol.9, No.5 | | 2005.05.31 |
27 | Practical and Provably-Secure Multicasting over High-Delay Networks | Junghyun Nam, Hyunjue Kim, Seungjoo, Dongho Won, and Hyungkyu Yang | 5th International Conference Atlanta, GA, USA LNCS 3515 | | 493-501 | 2005.05.22 |
26 | Implementation of Streamlining PKI System for Web Services | Namje Park, Kiyoung Moon, jongsu Jang, Sungwon Sohn, Dongho Won | 2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 1, LNCS.348 | | 609-618 | 2005.05.09 |
25 | A Time-Variant Risk Analysis and Damage Estimation for large- Scale Network Systems | InJung Kim, YoonJung Chung, YoungGyo Lee, Dongho Won | 2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 2, LNCS 3481 | | 92-102 | 2005.05.09 |
24 | Open Location-Based Service Using Secure Middleware Infrastructure in Web Services | Namje Park, Howon Kim, Seungjoo, and Dongho Won | 2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 2, LNCS 3481 | | 1146 -1155 | 2005.05.09 |
23 | An Efficient Dynamic Group Key Agreement for Low-Power Mobile Device | Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won | 2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 1, LNCS. 3480 | | 498-507 | 2005.05. |
22 | Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment | Keunwoo Rhee, Jin Kwack, Seungjoo Kim, and Dongho Won | Springer Verlag, LNCS 3450 | | 70-84 | 2005.04.07 |
21 | A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS | Younggyo Lee, Injung Kim, Seungjoo Kim, and Dongho Won | Proc. of EuroPKI 2005, European PKI Workshop, LNCS 3545 | | 215-226 | 2005. |
20 | A Method for Deciding Quantization Steps in QIM Watermarking Schemes | Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won, and Hyungkyu Yang | SecUbiq 2005, Spring-Verlag, LNCS 3823 | | 965-975 | 2005. |
19 | Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communication | Jin Kwak, Soohyun Oh, and Dongho Won | Proceeding of PARA '04 Workshop on State-of-Art in Scientific Computing | | | 2004.06.20 |
18 | Simple and Efficient Group Key Agreement Based on Factoring | Junghyun Nam, Seokhyang Cho, Seungjoo Kim, and Dongho Won | ICCSA'04 Proceeding Part 1 LNCS. 3043 | | 645-654 | 2004.05.14 |
17 | Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Password | Jeeyeon Kim, Seungjoo Kim, jin Kwak, and Dongho Won | ICCSA'04 Proceeding Part 1, LNCS. 3043 | | 895-902 | 2004.05.14 |
16 | Security Enhanced WTLS Handshake Protocol | Jin Kwak, Jongsu Han, Soohyun Oh, and Dongho Won | ICCSA'04 Proceeding Part 2, LNCS. 3045 | | 955-964 | 2004.05.14 |
15 | An Efficient Hybrid Cryptosystem Providing Authentication for Sender's Identity | Sooyhun Oh, Jin Kwak, and Dongho Won | Springer Verlag, LNCS. 2662 | | 737-746 | 2003.09.01 |
14 | Security Analysis and Application of Standard Key Agreement Protocols | Soohyun Oh, Jin Kwak, Seungwoo, Lee, and Dongho Won | ICCSA 2003, Springer, LNCS. 2668 | | 191-200 | 2003.05.17 |
13 | On the Security of Girault Key Agreement Protocols against Active Attacks | Soo-Hyun OH, Masahiro MAMBO, Hiroki SHIZUYA, and Dong-Ho WON | IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences | Vol.86, No.5 | 1181-1189 | 2003.05.01 |
12 | An improvement of VeriSign’s key roaming service protocol | Kim, Jeeyeon and Kwon, Hyunjo and Park, Haeryong and Kim, Seungjoo and Won, Dongho | Web Engineering. Springer Berlin Heidelberg, 2003 | | 281-288 | 2003. |
11 | Cryptanalysis of flexible remote password authentication scheme of ICN'01 | Seungjoo Kim, Seongan Lim Dongho Won | IEEE Electronic Letters | 제38권 24호 | 1519-1520 | 2002.11.21 |
10 | Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm | Dug-Hwan Choi, Seungbok Choi, Dongho Won | Springer-Verlag, LNCS. 2288 | | 72-80 | 2002.03. |
9 | Strong Adaptive Chosen-Ciphertext Attack with Memory Dump | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won and Yuliang Zheng | Springer-Verlag, LNCS 2260 | | 114-127 | 2001.12.17 |
8 | Efficient Anonymous Fingerprinting of Electronic Information, with Improved Automatic Identification of Redistributors | Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won | Springer Verlag Lecture note in computer, LNCS. 2015 | | 221-234 | 2001.04. |
7 | On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks | Seungjoo Kim, Masahiro Mambo,Takeshi Okamoto,Hirki Shizuya Mitsuru Tada and Dongho Won | IEICE Transaction on Fundamentals Electronics, Communications and Computer Sciences | Vol.84, No.1 | 231-238 | 2001.01.31 |
6 | The efficient 3-pass password-based key exchange protocol with low computational cost for client | Hyoungkyu Lee, Kiwook Sohn, Hyoungkyu Yang, and Dongho Won | Information Security and Cryptology-ICISC’99. Springer Berlin Heidelberg,
2000 | | 147-155 | 2000. |
5 | Two efficient RSA Multisignature Schemes | Sangjoon Park, Sangwoo Park, Kwangjo Kim and Dongho Won | Springer Verlag Lecture Note in Computer Science 1334 | | 217-222 | 1997.11. |
4 | Proxy Signature, Revisited | Seungjoo Kim, Sangjoon Park and Dongho Won | Springer Verlag Lecture Note in Computer Science 1334 | | 223-232 | 1997.11. |
3 | Group Signatures for Hierarchical Multigroups | Seungjoo Kim, Sangjun Park, Dongho Won | JAIST ISW Springer-Verlag, LNCS 1396 | | 181-190 | 1997.09. |
2 | ID-based group signature | Sangjoon Park, Seungjoo Kim and Dongho Won | Electronics Letters | Vol.33, No.19 | 1616 | 1997.09. |
1 | Convertible Group Signature | Seung Joo Kim, Sung Jun Park, Dong Ho Won | Asiacrypt 96 Springer-Verlag, LNCS 1163 | | 311-321 | 1996.11. |