2007 |
14 | EE | Il-Gon Kim:
Static Verification of Access Control Model for AXML Documents.
APWeb/WAIM 2007: 687-696 |
13 | EE | Debmalya Biswas,
Il-Gon Kim:
Atomicity for P2P based XML Repositories.
ICDE Workshops 2007: 363-370 |
2006 |
12 | EE | Il-Gon Kim,
Hyun Seok Kim,
Ji-Yeon Lee,
Jin-Young Choi,
Inhye Kang:
Secrecy Analysis of Purchase Transaction in Electronic Purses.
AINA (1) 2006: 979-984 |
11 | EE | Hyun Seok Kim,
Il-Gon Kim,
Keun-Hee Han,
Jin-Young Choi:
Security and Privacy Analysis of RFID Systems Using Model Checking.
HPCC 2006: 495-504 |
10 | EE | Il-Gon Kim,
Debmalya Biswas:
Application of Model Checking to AXML System's Security: A Case Study.
WS-FM 2006: 242-256 |
9 | | Il-Gon Kim,
Miyoung Kang,
Jin-Young Choi,
Peter D. Zegzhda,
Maxim O. Kalinin,
Dmitry P. Zegzhda,
Inhye Kang:
Formal Verification of Security Model Using SPR Tool.
Computers and Artificial Intelligence 25(5): (2006) |
8 | EE | Keun-Hee Han,
Il-Gon Kim,
Kang-Won Lee,
Jin-Young Choi,
Sang-Hun Jeon:
Threat Evaluation Method for Distributed Network Environment.
J. Inf. Sci. Eng. 22(4): 889-907 (2006) |
2005 |
7 | EE | Chul-Wuk Jeon,
Il-Gon Kim,
Jin-Young Choi:
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR.
AINA 2005: 507-510 |
6 | EE | Hyun Seok Kim,
Il-Gon Kim,
Jin-Young Choi:
Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System.
ICDCS Workshops 2005: 217-223 |
5 | EE | Il-Gon Kim,
Young-Joo Moon,
Inhye Kang,
Ji-Yeon Lee,
Keun-Hee Han,
Jin-Young Choi:
Model-Based Analysis of Money Accountability in Electronic Purses.
WINE 2005: 346-355 |
4 | | Keun-Hee Han,
Il-Gon Kim,
Kang-Won Lee,
Ji-Yeon Choi,
Sang-Hun Jeon:
Development of Threat Evaluation Tool for Distributed Network Environment.
Computers and Artificial Intelligence 24(2): (2005) |
3 | EE | Il-Gon Kim,
Jin-Young Choi:
Model Checking of RADIUS Protocol in Wireless Networks.
IEICE Transactions 88-B(1): 397-398 (2005) |
2004 |
2 | EE | Il-Gon Kim,
Jin-Young Choi:
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking.
AINA (2) 2004: 264-269 |
1 | | Il-Gon Kim,
Jin-Young Choi:
New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR.
VVEIS 2004: 75-77 |