2009 |
22 | EE | Shengbao Wang,
Zhenfu Cao,
Kim-Kwang Raymond Choo,
Lihua Wang:
An improved identity-based key agreement protocol and its security proof.
Inf. Sci. 179(3): 307-318 (2009) |
2008 |
21 | EE | Kim-Kwang Raymond Choo:
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition.
Comput. J. 51(6): 744 (2008) |
2007 |
20 | EE | Sherman S. M. Chow,
Kim-Kwang Raymond Choo:
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.
ISC 2007: 203-220 |
19 | EE | Raphael C.-W. Phan,
Kim-Kwang Raymond Choo,
Swee-Huay Heng:
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
ProvSec 2007: 169-177 |
18 | EE | Byoungcheon Lee,
Kim-Kwang Raymond Choo,
Jeongmo Yang,
Seungjae Yoo:
Secret Signatures: How to Achieve Business Privacy Efficiently?
WISA 2007: 30-47 |
17 | EE | Kim-Kwang Raymond Choo:
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.
Comput. J. 50(5): 591-601 (2007) |
16 | EE | Kim-Kwang Raymond Choo:
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker.
Informatica, Lith. Acad. Sci. 18(4): 547-568 (2007) |
2006 |
15 | EE | Colin Boyd,
Kim-Kwang Raymond Choo,
Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
ACISP 2006: 371-382 |
14 | EE | Qiang Tang,
Kim-Kwang Raymond Choo:
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
ACNS 2006: 162-177 |
13 | EE | Rong Du,
Ernest Foo,
Colin Boyd,
Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering.
ACSW Frontiers 2006: 155-164 |
12 | EE | Kim-Kwang Raymond Choo:
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.
CSFW 2006: 297-308 |
11 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Computer Communications 29(15): 2788-2797 (2006) |
10 | EE | Kim-Kwang Raymond Choo:
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.
Informatica, Lith. Acad. Sci. 17(4): 467-480 (2006) |
2005 |
9 | EE | Kim-Kwang Raymond Choo,
Yvonne Hitchcock:
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
ACISP 2005: 429-442 |
8 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
ASIACRYPT 2005: 585-604 |
7 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols.
ASIACRYPT 2005: 624-643 |
6 | EE | Wai-Ki Richard Au,
Kim-Kwang Raymond Choo,
Mark Looi:
A Secure Anonymous Authorisation Architecture for E-Commerce.
EEE 2005: 106-111 |
5 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols.
Mycrypt 2005: 116-131 |
4 | EE | Colin Boyd,
Kim-Kwang Raymond Choo:
Security of Two-Party Identity-Based Key Agreement.
Mycrypt 2005: 229-243 |
2004 |
3 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock,
Greg Maitland:
Complementing Computational Protocol Analysis with Formal Specifications.
Formal Aspects in Security and Trust 2004: 129-144 |
2 | EE | Richard Au,
Harikrishna Vasanta,
Kim-Kwang Raymond Choo,
Mark Looi:
A user-centric anonymous authorisation framework in e-commerce environment.
ICEC 2004: 138-147 |
1 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock,
Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
SCN 2004: 351-366 |