dblp.uni-trier.dewww.uni-trier.de

Seungjoo Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
60EEHeasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won: Security Specification for Conversion Technologies of Heterogeneous DRM Systems. ISPEC 2009: 159-170
2008
59EENamje Park, Dooho Choi, Seungjoo Kim, Dongho Won: Enforcing security in mobile RFID networks multilateral approaches and solutions. NOMS 2008: 999-1002
58EEDonghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim: Protection Profile for Connected Interoperable DRM Framework. WISA 2008: 320-332
2007
57EEDonghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won: An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. ATC 2007: 135-145
56EENamje Park, Seungjoo Kim, Dongho Won: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. AWIC 2007: 278-283
55EESangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won: Efficient Password-Authenticated Key Exchange Based on RSA. CT-RSA 2007: 309-323
54EEDonghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won: Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. HCI (5) 2007: 547-552
53EEYoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won: A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. KES-AMSTA 2007: 1007-1016
52EEJunghyun Nam, Seungjoo Kim, Sangjoon Park, Dongho Won: Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards. IEICE Transactions 90-A(1): 299-302 (2007)
51EEJunghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won: Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf. Sci. 177(6): 1364-1375 (2007)
2006
50 Dongho Won, Seungjoo Kim: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Springer 2006
49EENamje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748
48EEJin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590
47EEYoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won: A PKI System for Detecting the Exposure of a User's Secret Key. EuroPKI 2006: 248-250
46EEHe Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won: Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ICCSA (2) 2006: 954-963
45EEYoungsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won: Two Efficient and Secure Authentication Schemes Using Smart Cards. ICCSA (5) 2006: 858-866
44EEKeunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won: Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. ICHIT 2006: 607-616
43EEJeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won: Group Key Agreement Protocol Among Mobile Devices in Different Cells. ISPA Workshops 2006: 1090-1097
42EENamje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934
41EEYunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won: An Efficient Dispute Resolving Method for Digital Images. OTM Workshops (1) 2006: 331-341
40EENamje Park, Seungjoo Kim, Dongho Won, Howon Kim: Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505
39EEJunghyun Nam, Seungjoo Kim, Dongho Won: Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Transactions 89-A(1): 209-212 (2006)
38EEJunghyun Nam, Seungjoo Kim, Dongho Won: Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme. IEICE Transactions 89-A(1): 213-218 (2006)
37EEYunho Lee, Seungjoo Kim, Dongho Won: Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol. IEICE Transactions 89-A(7): 2084-2087 (2006)
2005
36EENamje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won: XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373
35EENamje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won: XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326
34EEJin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won: RFID System with Fairness Within the Framework of Security and Privacy. ESAS 2005: 142-152
33EEYunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang: A Method for Deciding Quantization Steps in QIM Watermarking Schemes. EUC Workshops 2005: 965-975
32EEYoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won: A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. EuroPKI 2005: 215-226
31EENamje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won: XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. GCC 2005: 323-333
30EESeokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won: An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. ICCSA (1) 2005: 498-507
29EENamje Park, Howon Kim, Seungjoo Kim, Dongho Won: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155
28EEJunghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang: Practical and Provably-Secure Multicasting over High-Delay Networks. International Conference on Computational Science (2) 2005: 493-501
27EEHyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won: Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. PCM (2) 2005: 117-128
26EEKeunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. SPC 2005: 70-84
25EEJunghyun Nam, Seungjoo Kim, Dongho Won: Secure Group Communications over Combined Wired and Wireless Networks. TrustBus 2005: 90-99
24EEJunghyun Nam, Seungjoo Kim, Dongho Won: Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. WISA 2005: 1-9
23EEJunghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won: DDH-based group key agreement in a mobile environment. Journal of Systems and Software 78(1): 73-83 (2005)
2004
22EEJunghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won: Simple and Efficient Group Key Agreement Based on Factoring. ICCSA (1) 2004: 645-654
21EEJeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won: Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ICCSA (1) 2004: 895-902
20EESeungjoo Kim, Dongho Won: Threshold Entrusted Undeniable Signature. ICISC 2004: 195-203
2003
19EESeungjoo Kim, Masahiro Mambo, Yuliang Zheng: Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243
18EEJung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim: An Analysis of Proxy Signatures: Is a Secure Channel Necessary? CT-RSA 2003: 68-79
17EEJeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won: An Improvement of VeriSign's Key Roaming Service Protocol. ICWE 2003: 281-288
16EEIkkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim: Prime Numbers of Diffie-Hellman Groups for IKE-MODP. INDOCRYPT 2003: 228-234
15EESung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon: RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. IEEE Trans. Computers 52(4): 461-472 (2003)
14EEKilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, Seonhee Yoon: Differential and linear cryptanalysis for 2-round SPNs. Inf. Process. Lett. 87(5): 277-282 (2003)
2001
13EESung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon: RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. ICISC 2001: 397-413
12EESung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon: A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. ICISC 2001: 414-427
11EESeungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127
10EESeongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim: Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. INDOCRYPT 2001: 308-315
9EESeongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee: XTR Extended to GF(p6m). Selected Areas in Cryptography 2001: 301-312
8EEJeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won: Forward-Secure Commercial Key Escrow Systems. WETICE 2001: 211-216
2000
7EESeongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee: A Generalized Takagi-Cryptosystem with a modulus of the form prqs. INDOCRYPT 2000: 283-294
1999
6EESeungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park: On the Difficulty of Key Recovery Systems. ISW 1999: 207-224
5EEMarc Joye, Seungjoo Kim, Narn-Yih Lee: Cryptanalysis of Two Group Signature Schemes. ISW 1999: 271-275
1998
4 Seungjoo Kim, Soohyun Oh, Dongho Won: One-time self-certified public keys, revisited. ICISC 1998: 59-69
1997
3 Seungjoo Kim, Sangjoon Park, Dongho Won: Proxy signatures, Revisited. ICICS 1997: 223-232
2 Seungjoo Kim, Sangjoon Park, Dongho Won: Group Signatures for Hierarchical Multigroups. ISW 1997: 273-281
1996
1 Seungjoo Kim, Sungjun Park, Dongho Won: Convertible Group Signatures. ASIACRYPT 1996: 311-321

Coauthor Index

1Jeonghee Ahn [47] [53]
2Jung Hee Cheon [11] [18]
3Seokhyang Cho [22] [30]
4Sungkyu Cho [58]
5Donghyun Choi [57] [58]
6Dooho Choi [59]
7Youngsung Choi [54]
8Kilsoo Chun [14] [43]
9Kyoil Chung [31] [36]
10Woongryul Jeon [60]
11Heasuk Jo [41] [60]
12Marc Joye [5] [11]
13Hogab Kang [57]
14Dongryeol Kim [16]
15Howon Kim (Ho Won Kim) [29] [35] [36] [40] [42] [48] [49]
16Hyunjue Kim [27] [28]
17In-Jung Kim [32]
18Jaemoon Kim [9] [10]
19Jeeyeon Kim [8] [17] [21] [43]
20Jin Kwak [21] [26] [34] [42] [44] [46] [48] [49]
21Hyunjo Kwon [8] [17]
22Hongsub Lee [7] [9]
23Insoo Lee [6]
24Jaeil Lee [43]
25Jinwoo Lee [23]
26Jung-Yeun Lee [18]
27Kwang-Woo Lee [33]
28Narn-Yih Lee [5]
29Sangjin Lee [14]
30Sungjae Lee [8]
31Wansuk Lee [46]
32YoungGyo Lee [32] [47] [53]
33Youngsook Lee [45] [51]
34Yunho Lee [33] [37] [41] [54] [57] [60]
35Seongan Lim [7] [9] [10] [11] [12] [13] [15] [16]
36Masahiro Mambo [6] [11] [19]
37Kiyoung Moon [31] [35]
38Sang-Jae Moon [12] [13] [15]
39Junghyun Nam [22] [23] [24] [25] [27] [28] [30] [38] [39] [45] [51] [52] [55]
40Soohyun Oh [4] [34]
41Chanho Park [44]
42Haeryong Park [17]
43Namje Park [29] [31] [35] [36] [40] [42] [48] [49] [56] [59]
44Sangjoon Park [2] [3] [8] [44] [52] [54] [55]
45Sungjun Park [1] [6]
46Keunwoo Rhee [26] [34] [44] [48]
47Kouichi Sakurai [48]
48Donghwi Shin [54]
49Kyungho Son [46]
50Soo Hak Sung [14]
51Dongho Won [1] [2] [3] [4] [8] [11] [17] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60]
52Hyungkyu Yang [28] [33] [44]
53Sung-Ming Yen [12] [13] [15]
54Wan S. Yi [44]
55Ikkwon Yie [7] [9] [10] [16]
56Seonhee Yoon [14]
57He Zheng [46]
58Yuliang Zheng [11] [19]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)