메뉴 건너뛰기

Welcome to ISG

NumberTitleAuthorPublisherVolumePagePublish Date
130Can differential privacy practically protect collaborative deep learning inference for IoT?Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong WangWireless Networks (IF : 3.165)2022.09.05
129MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networksDegefa Fikadu, Jihyeon Ryu, Hyoungshick Kim, Dongho WonPLOS ONE (IF : 3.752)Vol. 17, No. 5e02626962022.05.26
128SMASG: Secure Mobile Authentication Scheme for Global Mobility NetworkJihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho WonIEEE ACCESS (IF : 3.367)Vol. 1026907-269192022.03.08
127Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication SchemeJihyeon Ryu, Dongwoo Kang, Dongho WonIEEE ACCESS (IF : 3.367)Vol. 1015891-159102022.02.07
126Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing EnvironmentHakjun Lee, Dongwoo Kang, Youngsook Lee, Dongho WonWireless Communications and Mobile Computing (IF : 2.336)2021.7.27
125Lightweight User authentication scheme for roaming service in GLOMONET with privacy PreservingDongwoo Kang, Hakjun Lee, Youngsook Lee, Dongho WonPLOS ONE(IF : 2.740)Vol.16, No.21-402021.02.15
124A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare SystemsJihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim and Dongho WonSensors (IF:3.275)Vol.20, No.241-252020.12.12
123Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless CommunicationMijin Kim, Jongho Moon, Dongho Won, Namje Parkelectronics (IF : 1.764)Vol.9, No.51-162020.05.05
122A three-factor anonymous user authentication scheme for Internet of Things environmentsHakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook LeeJournal of Information Security and Applications (IF:1.537)Vol.52, No.61-142020.04.08
121Secure and Efficient Three-Factor Protocol for Wireless Sensor NetworksJihyeon Ryu, Hakjun Lee, Hyoungshick Kim, and Dongho Wonsensors(IF : 2.475)Vol.18, Issue.121-182018.12.18
120Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with AnonymityDongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, and Dongho WonSecurity and Communication Networks (IF:0.904) Vol.20181-142018.06.20
119An improved anonymous authentication scheme for roaming in ubiquitous networksHakjun Lee, Donghoon Lee, Jongho Moon, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho WonPLOS ONE(IF : 2.806)Vol.13, No.31-332018.03.05
118Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile UserJongho Moon, Youngsook Lee, Jiye Kim, and Dongho WonSecurity and Communication Networks (IF:0.806)Vol.20171-132017.09.27
117Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information SystemsJaewook Jung, Jongho Moon, Dongho WonKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS(IF:0.452)Vol.11, No.73720-37462017.07.31
116Security analysis and enhanced user authentication in proxy mobile IPv6 networksDongwoo Kang, Jaewook Jung, Donghoon Lee, Hyoungshick Kim, Dongho WonPLOS ONE (IF:2.806)Vol.12, No.71-202017.07.18
115Security enhanced multi-factor biometric authentication scheme using bio-hash functionYounsung Choi, Youngsook Lee, Jongho Moon and Dongho WonPLOS ONE (IF:3.234)Vol.12, No.51-322017.05.01
114Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor NetworksJongho Moon, Donghoon Lee, Youngsook Lee and Dongho Won sensors (IF:2.033)Vol.17, No.51-242017.04.25
113Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor NetworksJaewook Jung, Jongho Moon, Donghoon Lee and Dongho Wonsensors (IF:2.033)Vol.17, No.31-212017.03.21
112An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information SystemJaewook Jung, Dongwoo Kang, Donghoon Lee and Dongho WonPLOS ONE (IF:3.234)Vol.12, No.11-262017.01.03
111Improvement and Weakness of Zero-sum Defender against Return-Oriented Programming AttacksDonghoon Lee, Jaewook Jung, Younsung Choi and Dongho WonIEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (IF:0.40)Vol.E99-A No.122016.12.
110An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor NetworksYoungseok Chung, Seokjin Choi, Youngsook Lee, Namje Park and Dongho Wonsensors (IF:2.033)Vol.16, No.101-222016.10.07
109An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor NetworksJaewook Jung, Jiye Kim, Younsung Choi and Dongho Wonsensors (IF:2.033)Vol. 16, No. 81-302016.08.16
108Efficient and robust user authentication scheme that achieve user anonymity with a Markov chainDongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi and Dongho Won*Security and Communication Networks (IF:0.806)Vol.9, Issue.111462-14762016.07.25
107API-Based Software Birthmarking Method Using Fuzzy HashingDonghoon lee, Dongwoo Kang, Younsung Choi, Jiye Kim and Dongho WonIEICE TRANSACTIONS on Information and Systems (IF : 0.41)Vol.E99-D, No.71836-18512016.07.01
106Security Analysis and Improvements of Session Key Establishment for Clustered Sensor NetworksJiye Kim, JonghoMoon, Jaewook Jung, and Dongho WonJournal of Sensors (IF:0.712)Vol.2016, Article ID 43937211-172016.06.
105Forward Anonymity-Preserving Secure Remote Authentication Scheme Hanwook Lee, Junghyun Nam, Moonseong Kim and Dongho WonKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS(IF: 0.561)Vol.10, No.31289-13092016.03.31
104An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic MapsJongho Moon, Younsung Choi, Jiye Kim and Dongho WonJournal of Medical Systems (IF:2.213)Vol40, No.31-112016.01.07
103Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy ExtractionYounsung Choi, Youngsook Lee and Dongho WonInternational Journal of Distributed Sensor Networks (IF : 0.665)Vol.2016, Article ID 85724101-162016.01.06
102An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart CardsJongho Moon, Younsung Choi, Jaewook Jung, Dongho Won PLOS ONE (IF:3.234)vol.10, No.121-152015.12.28
101Performance and security enhanced authentication and key agreement protocol for SAE/LTE networkFikadu B. Degefa, Donghoon Lee, Jiye Kim, Younsung Choi and Dongho WonComputer Networks (IF:1.256)1-192015.12.04
100Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE)Hanwook Lee and Dongho Wonsymmetry (IF:0.826)vol.7, No.31587-15942015.09.02
99Anonymous Authentication Scheme for Intercommunication in the Internet of Things EnvironmentsYoungseok Chung, Seokjin Choi, and Dongho WonInternational Journal of Distributed Sensor Networks (IF:0.665)Article ID 3057851-142015.09.01
98Security requirement for mobile virtualizationHyunjung Lee and Dongho WonAsia Life Sciences (IF:0.075)Supplement 11217-2282015.07.26
97The reusable vulnerability of signed package with the same certificateDonghwi Shin, Jongsup Park, Chanam Park and Dongho WonAsia Life Sciences (IF:0.075)Supplement 11587-6022015.07.26
96Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor ComputationJunghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han , Moonseong Kim, Juryon Paik, Dongho WonPLOS ONE (IF:3.23)Vol.10, No.41-212015.04.07
95An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party SettingJunghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho WonIEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (IF:0.226)Vol.E98-A, No.1424-4272015.01.31
94Two-Round Password-Only Authenticated Key Exchange in the Three-Party SettingJunghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Juryon Paik, Dongho Wonsymmetry (IF:0.826)Vol.7, No.1105-1242015.01.27
93Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding PropertyKyungho Son, Dongguk Han, Dongho WonIEICE TRANSACTIONS on Communications (IF:0.326)Vol.98, No.1160-1702015.01.01
92A provably-secure ECC-based authentication scheme for wireless sensor networksJunghyun Nam, Moonseong Kim, Juryon Paik, Youngsook Lee, and Dongho WonSensorsVol.14, No.1121023-210442014.11.06
91A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsKim-Kwang Raymond Choo, Junghyun Nam, Dongho WonInformation SciencesVol.281182-2002014.10.
90Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and BiometricsYounsung Choi, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung and Dongho WonScientific World JournalVol.20141-152014.09.08
89On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public KeysJunghyun Nam, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho WonScientific World JournalVol.20141-72014.09.01
88Association Rule Extraction from XML Stream Data for Wireless Sensor NetworksJuryon Paik, Junghyun Nam, Ung Mo Kim and Dongho WonSensorsVol.14, No.712937-129572014.07.18
87Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographyYounsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam and Dongho WonSensorsVol.14, No.610081-101062014.06.10
86Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree DataJuryon Paik, Junghyun Nam, Ung Mo Kim, Dongho WonJournal of Information Science and EngineeringVol.30, No.3787-8172014.05.15
85Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard ModelJunghyun Nam, Kim-Kwang Raymond Choo, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim, Juryon Paik, and Dongho WonScientific World JournalVol.20141-112014.04.14
84Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor NetworksJiye Kim, Donghoon Lee, Woongryul Jeon, Youngsook Lee and Dongho WonSensorsVol.14, No.46443-64622014.04.09
83Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange ProtocolsJunghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik and Dongho WonKSII TIISVol.7, No.123244-32602013.12
82Threat modeling of a mobile device management system for secure smart workKeunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo ParkElectronic Commerce Researchvol,13, No.3243-2562013.09.
81Hybrid Key Management Architecture for Robust SCADA SystemsDonghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo KimJournal of Information Science and EngineeringVol.29, No.2281-2982013.03
80A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing TestbedJunwon Lee, Jaeik Cho, Jung-Taek Seo, Taeshik Shon, Dongho WonMONET Vol.18, No.1122-1282013.02
79An Enhanced Secure Authentication Scheme with Anonymity for Wireless EnvironmentsWoongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho WonIEICE Transactions On CommunicationsVol.95, No.51819-18212012.06.30
78A Privacy-Protecting Authentication Scheme for Roaming Services with Smart CardsKyungho Son, Dong-Guk Han, Dongho WonIEICE Transactions on CommunicationVol.95, No.51819-18212012.05.31
77Hybrid search engine: concept and framework남정현, 백주련, 김응모, 원동호Information-An International Interdisciplinary JournalVol.15, No.51863-18742012.05.
76Security Weakness in Harn-Lin and Dutta-Barua Protocols for Group Ley Establishment남정현, 문영성, 백주련, 원동호KSIIVol.6, No.2751-7652012.02.29
75A Practical and Secure Electronic Election SystemYunho Lee, Dongho WonETRI JournalVol.34, No.155-652012.02.28
74A Study on Security Management Service System for Wireless Network environment이대섭, 원동호Applied Mathematics & Information ScienceVol.6, No.1209-2202012.01.
73Scalable Group Key Exchange for Securing Distributed Operating SystemsJunghyun Nam, Minkyu Park, Sangchul Han, Juryon Paik, and Dongho WonJournal of Information Science and EngineeringVol.28, No.5829-8552012.
72Advanced Information Security Management Evaluation System조혜숙, 김승주, 원동호Transaction on Internet and InformationsVol.5, No.61192-12132011.06.30
71A Secure and Efficient E-Will System Based on PKIKwangwoo Lee, Dongho Won, and Seungjoo KimInformation-An International Interdisciplinary Journal, International Information InstituteVol.14, No.72187-22062011.06.30
70Secure Data Deletion for USB Flash MemoryByunghee Lee, Kyungho Son, Dongho Won and Seungjoo KimJournal of Information Science and EngineeringVol.27, No.3933-9522011.05.31
69Secure and Efficient Code Encryption scheme Based on Indexed Table조성규, 신동휘, 조혜숙, 최동현, 원동호, 김승주ETRI JournalVol.33, No.1-702011.02.28
68Security Improvement on Wu and Zhu's Protocol for password-authenticated Group Key Exchange남정현, 백주련, 원동호IEICE transaction on fundamentals of electronics, communication and computer sciencesVol.94, No.2865-8682011.02.
67A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol남정현, 백주련, 원동호Information ScienceVol.181, No.1234-2382011.01.01
66Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication ProtocolHanjae Jeong, Dongho Won and Seungjoo KimJournal of Information Science and EngineeringVol.26, No.51845-18582010.09.30
65Towards trustworthy e-voting using paper receiptsYunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim and Dongho WonComputer Standards & interfaces(32)2010.06.
64Efficient Secure Group Communications for SCADADonghyun Choi, Sungjin Lee, Dongho Won, and Seungjoo KimIEEE Trans. on Power DeliveryVol.25, No.2714-7222010.04.30
63Enhancement of two-factor authenticated key exchange protocols in public wireless LANsYunho Lee, Seungjoo Kim, Dongho WonAn International Journal of Computers and Electrical Engineering (Elsevier)Vol.36, No.1213-2232010.01.30
62Advanced Key Management Architecture for Secure SCADA for Secure SCADA CommunicationsDonghyun Choi, Hakman Kim, Dongho Won, and Seungjoo KimIEEE Transactions on Power DeliveryVol.24, No.31154-11632009.06.30
61Fast Extraction of Maximal Frequent Subtrees Using Bits RepresentationJuryon Paik, Junghyun Nam, Dongho Won, and Ung Mo KimJournal of information science and engineeringVol.25, No.2435-4642009.03.01
60An Off-Line Dictionary Attack on a Simple Three-Part Key Exchange ProtocolJunghyun Nam, Juryon Paik, Hyun-Kyu Kang, Ung Mo Kim, and Dongho WonIEEE Communication LettersVol.13. No.3205-2072009.03.01
59Security Enhancement to a Password-Authenticated Group Key Exchange Protocol for Mobile Ad-hoc NetworksJunghyun Nam, Juryon Paik, Ung Mo Kim,and Dongho WonIEEE comm. LettersVol.12, No.2127-1302008.02.
58Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networksJunghyun Nam, Juryon Paik, Ung Mo Kim, Dongho WonInformation sciences 177 Elsevier5441-54672007.12.01
57Security weakness in a three-party pairing-based protocol for password authenticated key ExchangeJunghyun Nam, Youngsook Lee, Seungjoo Kim, and Dongho WonInformation Sciences (Elsevier)Vol.177, No.61364-13752007.03.15
56Security Analysis of a Nounce-Based User Authentication Scheme Using Smart CardsJunghyun Nam, Seungjoo Kim, Sangjoon Park, and Dongho WonIEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (IF:0.40)Vol.90, No.1299-3022007.01.01
55Group Key Exchange over Combined Wired and Wireless NetworksJunghyun Nam and Dongho WonJournal of communications and networks461-4742006.12.31
54Security Analysis and Implementation Leveraging Globally Networked RFIDsNamje Park, Seungjoo Kim, Dongho Won, and Howon KimPWC 2006, LNCS 4217494-5052006.12.09
53Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting ProtocolYunho Lee, Seungjoo Kim, and Dongho WonIEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (IF:0.40)2084-20872006.07.01
52A PKI System for Detecting the Exposure of a User’s Secret KeyYounggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho WonProc. of EuroPKI 2006 Springer-Verlag, LNCS 4043348-2502006.06.19
51An efficient POP protocol based on the signcryption scheme for the WAP PKISungduk Kim, Kyungjin Kim, Jaedong Jung, and Dongho WonProc. of EuroPKI 2006, Springer-Verlag, LNCS 4043223-2322006.06.19
50Design of an On-Line Intrusion Forecast System with a Weather Forecasting ModelYoonJung Chung, InJung Kim, Chulsoo Lee, Eul Gyu Im, and Dongho WonProc. of ICCSA 2006, Springer-Verlag, LNCS 3983777-7862006.05.07
49Two Efficient and Secure Authentication Schemes Using Smart CardsYoungsook Lee, Junghyun Nam, Seungjoo Kim, and Dongho WonProc. of ICCSA 2006, Springer-Verlag, LNCS 3984858-8662006.05.07
48An Inter-Domain Key Agreement Protocol Using Weak PasswordsYoungsook Lee, Junghyun Nam, and Dongho WonProc. of ICCSA 2006 Springer-Verlag, LNCS 3982517-5262006.05.07
472-Way Text Classification for Harmful Web DocumentsYoungsoo Kim, T.Y Nam, Dongho WonProc. of ICCSA 2006,Springer-Verlag, LNCS 3981545-5512006.05.07
46Confidence Value based Multi Levels of Authentication for Ubiquitous Computing EnvironmentsHe Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, and Dongho WonProc. of ICCSA 2006 Springer-Verlag, LNCS 3981954-9632006.05.07
45XML- Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed ComputingNamje Park, Howon Kim, Kyoil Chung Sungwon Sohn, and Dongho WonProc. of ICCSA 2006 Springer-Verlag, LNCS 3984251-2592006.05.07
44A Semantic Context-Aware Access Control in Pervasive EnvironmentsHyuk Jin Ko, Dong Ho Won, Dong Ryul Shin, Hyun Seung Choo, and Ung Mo KimProc. of ICCSA 2006 Springer-Verlag, LNCS 3981165-1742006.05.07
43Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using PasswordJunghyun Nam, Seungjoo Kim, and Dongho WonIEICE Transaction on FundamentalsVol.89, No.1213-2182006.01.31
42Weakness in Jung et al.'s ID-Based Conferance Key Distribution SchemeJunghyun Nam, Seungjoo Kim, and Dongho WonIEICE Transaction on FundamentalsVol.89, No.1209-2122006.01.31
41WIPI Mobile Platform with Secure Service for Mobile RFID Network EnvironmentNamje Park, Jin Kwak, Howon Kim, seungjoo Kim and Dongho WonWBICSE 2006, Springer-Verlag, LNCS 3482741-7482006.01.16
40Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party ProtocolsNam, Junghyun, Seungjoo Kim, and Dongho WonInformation Security Applications. Springer Berlin Heidelberg1-92006.
39XML-Based Digital Signature Accelerator in Open Mobile Grid ComputingNamje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, and Dongho WonLNCS 3795323-3332005.11.30
38XML-Based Digital Signature Accelerator in Open Mobile Grid ComputingNamje Park, Kiyoung Moon, Kyoil Chung, Seung, Dongho WonGrid and Cooperative Computing GCC 2005 LNCS 3795323-3332005.11.30
37Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TVHyunjue Kim, Junghyun Nam Seungjoo Kim, and Dongho Won6th Pacific-Rim Conference on Multimedia LNCS 3768117-1282005.11.13
36DDH-based group key agreement in a mobile environmentJunghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho WonThe journal of Systems and SoftwareVol.78, No.173-832005.10.30
35XML-Based Security Acceleration Methods Supporting Fast Mobile GridNamje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho WonEC-Web, LNCS 3590316-3262005.08.21
34Secure Group Communications over Combined Wired and Wireless NetworksJunghyun Nam, Seungjoo Kim, and Dongho WonTrustBus, 2005, LNCS 359290-992005.08.21
33A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web ServicesNamje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, and Yuliang ZhengICWE 2005 Springer Verlag, LNCS 3579191-1962005.07.30
32Threshold Entrusted Undeniable SignatureSeungjoo Kim, and Dongho WonInternational Conference on Information security and Cryptology, LNCS 3506195-2032005.06.30
31RFID System with Fairness Within the Framework of Security and PrivacyJin Kwak, Keunwoo Rhee, Soohyun Oh Seungjoo Kim, and Dongho WonSecurity and Privacy in Ad-hoc and Sensor Network LNCS 3813142-1522005.06.13
30EXit-B A New Approach for Extracting Maximal Frequent Subtrees from XML DataJuryon Paik, Dongho Won, Farshad Fotouhi, and Ung Mo KimIDEAL 2005, Springer Verlag LNCS. 35781-82005.06.08
29XKMS-Based Key Management for Open LBS in Web Services EnvironmentNamje Park, Howon Kim, Kyoil Chung, Dongho WonThird International Atlantic Web Intelligence Conference AWIC 2005, LNAI 3528367-3732005.06.06
28Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile DevicesJunghyun Nam, Seungjoo Kim, and Dongho WonIEEE Communications Letters Vol.9, No.52005.05.31
27Practical and Provably-Secure Multicasting over High-Delay NetworksJunghyun Nam, Hyunjue Kim, Seungjoo, Dongho Won, and Hyungkyu Yang5th International Conference Atlanta, GA, USA LNCS 3515493-5012005.05.22
26Implementation of Streamlining PKI System for Web ServicesNamje Park, Kiyoung Moon, jongsu Jang, Sungwon Sohn, Dongho Won2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 1, LNCS.348609-6182005.05.09
25A Time-Variant Risk Analysis and Damage Estimation for large- Scale Network SystemsInJung Kim, YoonJung Chung, YoungGyo Lee, Dongho Won2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 2, LNCS 348192-1022005.05.09
24Open Location-Based Service Using Secure Middleware Infrastructure in Web ServicesNamje Park, Howon Kim, Seungjoo, and Dongho Won2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 2, LNCS 34811146 -11552005.05.09
23An Efficient Dynamic Group Key Agreement for Low-Power Mobile DeviceSeokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won2005 International Conference on Computational Science and Its Applications(ICCSA 2005) part 1, LNCS. 3480498-5072005.05.
22Challenge-Response Based RFID Authentication Protocol for Distributed Database EnvironmentKeunwoo Rhee, Jin Kwack, Seungjoo Kim, and Dongho WonSpringer Verlag, LNCS 345070-842005.04.07
21A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KISYounggyo Lee, Injung Kim, Seungjoo Kim, and Dongho WonProc. of EuroPKI 2005, European PKI Workshop, LNCS 3545215-2262005.
20A Method for Deciding Quantization Steps in QIM Watermarking SchemesYunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won, and Hyungkyu YangSecUbiq 2005, Spring-Verlag, LNCS 3823965-9752005.
19Efficient Key Distribution Protocol for Electronic Commerce in Mobile CommunicationJin Kwak, Soohyun Oh, and Dongho WonProceeding of PARA '04 Workshop on State-of-Art in Scientific Computing2004.06.20
18Simple and Efficient Group Key Agreement Based on FactoringJunghyun Nam, Seokhyang Cho, Seungjoo Kim, and Dongho WonICCSA'04 Proceeding Part 1 LNCS. 3043645-6542004.05.14
17Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different PasswordJeeyeon Kim, Seungjoo Kim, jin Kwak, and Dongho WonICCSA'04 Proceeding Part 1, LNCS. 3043895-9022004.05.14
16Security Enhanced WTLS Handshake ProtocolJin Kwak, Jongsu Han, Soohyun Oh, and Dongho Won ICCSA'04 Proceeding Part 2, LNCS. 3045955-9642004.05.14
15An Efficient Hybrid Cryptosystem Providing Authentication for Sender's IdentitySooyhun Oh, Jin Kwak, and Dongho WonSpringer Verlag, LNCS. 2662737-7462003.09.01
14Security Analysis and Application of Standard Key Agreement ProtocolsSoohyun Oh, Jin Kwak, Seungwoo, Lee, and Dongho WonICCSA 2003, Springer, LNCS. 2668191-2002003.05.17
13On the Security of Girault Key Agreement Protocols against Active AttacksSoo-Hyun OH, Masahiro MAMBO, Hiroki SHIZUYA, and Dong-Ho WONIEICE Transaction on Fundamentals of Electronics, Communications and Computer SciencesVol.86, No.51181-11892003.05.01
12An improvement of VeriSign’s key roaming service protocolKim, Jeeyeon and Kwon, Hyunjo and Park, Haeryong and Kim, Seungjoo and Won, DonghoWeb Engineering. Springer Berlin Heidelberg, 2003281-2882003.
11Cryptanalysis of flexible remote password authentication scheme of ICN'01Seungjoo Kim, Seongan Lim Dongho WonIEEE Electronic Letters제38권 24호1519-15202002.11.21
10Improvement of Probabilistic Public Key Cryptosystems Using Discrete LogarithmDug-Hwan Choi, Seungbok Choi, Dongho WonSpringer-Verlag, LNCS. 228872-802002.03.
9Strong Adaptive Chosen-Ciphertext Attack with Memory DumpSeungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won and Yuliang ZhengSpringer-Verlag, LNCS 2260114-1272001.12.17
8Efficient Anonymous Fingerprinting of Electronic Information, with Improved Automatic Identification of RedistributorsChanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho WonSpringer Verlag Lecture note in computer, LNCS. 2015221-2342001.04.
7On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active AttacksSeungjoo Kim, Masahiro Mambo,Takeshi Okamoto,Hirki Shizuya Mitsuru Tada and Dongho WonIEICE Transaction on Fundamentals Electronics, Communications and Computer SciencesVol.84, No.1231-2382001.01.31
6The efficient 3-pass password-based key exchange protocol with low computational cost for clientHyoungkyu Lee, Kiwook Sohn, Hyoungkyu Yang, and Dongho WonInformation Security and Cryptology-ICISC’99. Springer Berlin Heidelberg, 2000147-1552000.
5Two efficient RSA Multisignature SchemesSangjoon Park, Sangwoo Park, Kwangjo Kim and Dongho WonSpringer Verlag Lecture Note in Computer Science 1334217-2221997.11.
4Proxy Signature, RevisitedSeungjoo Kim, Sangjoon Park and Dongho WonSpringer Verlag Lecture Note in Computer Science 1334223-2321997.11.
3Group Signatures for Hierarchical MultigroupsSeungjoo Kim, Sangjun Park, Dongho WonJAIST ISW Springer-Verlag, LNCS 1396181-1901997.09.
2ID-based group signatureSangjoon Park, Seungjoo Kim and Dongho WonElectronics LettersVol.33, No.1916161997.09.
1Convertible Group SignatureSeung Joo Kim, Sung Jun Park, Dong Ho WonAsiacrypt 96 Springer-Verlag, LNCS 1163311-3211996.11.