Il-Gon Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

14EEIl-Gon Kim: Static Verification of Access Control Model for AXML Documents. APWeb/WAIM 2007: 687-696
13EEDebmalya Biswas, Il-Gon Kim: Atomicity for P2P based XML Repositories. ICDE Workshops 2007: 363-370
12EEIl-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang: Secrecy Analysis of Purchase Transaction in Electronic Purses. AINA (1) 2006: 979-984
11EEHyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi: Security and Privacy Analysis of RFID Systems Using Model Checking. HPCC 2006: 495-504
10EEIl-Gon Kim, Debmalya Biswas: Application of Model Checking to AXML System's Security: A Case Study. WS-FM 2006: 242-256
9 Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang: Formal Verification of Security Model Using SPR Tool. Computers and Artificial Intelligence 25(5): (2006)
8EEKeun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon: Threat Evaluation Method for Distributed Network Environment. J. Inf. Sci. Eng. 22(4): 889-907 (2006)
7EEChul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi: Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. AINA 2005: 507-510
6EEHyun Seok Kim, Il-Gon Kim, Jin-Young Choi: Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. ICDCS Workshops 2005: 217-223
5EEIl-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi: Model-Based Analysis of Money Accountability in Electronic Purses. WINE 2005: 346-355
4 Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Choi, Sang-Hun Jeon: Development of Threat Evaluation Tool for Distributed Network Environment. Computers and Artificial Intelligence 24(2): (2005)
3EEIl-Gon Kim, Jin-Young Choi: Model Checking of RADIUS Protocol in Wireless Networks. IEICE Transactions 88-B(1): 397-398 (2005)
2EEIl-Gon Kim, Jin-Young Choi: Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. AINA (2) 2004: 264-269
1 Il-Gon Kim, Jin-Young Choi: New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. VVEIS 2004: 75-77

Coauthor Index

1Debmalya Biswas [10] [13]
2Ji-Yeon Choi [4]
3Jin-Young Choi [1] [2] [3] [5] [6] [7] [8] [9] [11] [12]
4Keun-Hee Han [4] [5] [8] [11]
5Chul-Wuk Jeon [7]
6Sang-Hun Jeon [4] [8]
7Maxim O. Kalinin [9]
8Inhye Kang [5] [9] [12]
9Miyoung Kang [9]
10Hyun Seok Kim [6] [11] [12]
11Ji-Yeon Lee [5] [12]
12Kang-Won Lee [4] [8]
13Young-Joo Moon [5]
14Dmitry P. Zegzhda [9]
15Peter D. Zegzhda [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)