2009 |
60 | EE | Heasuk Jo,
Woongryul Jeon,
Yunho Lee,
Seungjoo Kim,
Dongho Won:
Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
ISPEC 2009: 159-170 |
2008 |
59 | EE | Namje Park,
Dooho Choi,
Seungjoo Kim,
Dongho Won:
Enforcing security in mobile RFID networks multilateral approaches and solutions.
NOMS 2008: 999-1002 |
58 | EE | Donghyun Choi,
Sungkyu Cho,
Dongho Won,
Seungjoo Kim:
Protection Profile for Connected Interoperable DRM Framework.
WISA 2008: 320-332 |
2007 |
57 | EE | Donghyun Choi,
Yunho Lee,
Hogab Kang,
Seungjoo Kim,
Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
ATC 2007: 135-145 |
56 | EE | Namje Park,
Seungjoo Kim,
Dongho Won:
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.
AWIC 2007: 278-283 |
55 | EE | Sangjoon Park,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Efficient Password-Authenticated Key Exchange Based on RSA.
CT-RSA 2007: 309-323 |
54 | EE | Donghwi Shin,
Youngsung Choi,
Yunho Lee,
Sangjoon Park,
Seungjoo Kim,
Dongho Won:
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.
HCI (5) 2007: 547-552 |
53 | EE | YoungGyo Lee,
Jeonghee Ahn,
Seungjoo Kim,
Dongho Won:
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.
KES-AMSTA 2007: 1007-1016 |
52 | EE | Junghyun Nam,
Seungjoo Kim,
Sangjoon Park,
Dongho Won:
Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards.
IEICE Transactions 90-A(1): 299-302 (2007) |
51 | EE | Junghyun Nam,
Youngsook Lee,
Seungjoo Kim,
Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci. 177(6): 1364-1375 (2007) |
2006 |
50 | | Dongho Won,
Seungjoo Kim:
Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
Springer 2006 |
49 | EE | Namje Park,
Jin Kwak,
Seungjoo Kim,
Dongho Won,
Howon Kim:
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.
APWeb Workshops 2006: 741-748 |
48 | EE | Jin Kwak,
Keunwoo Rhee,
Namje Park,
Howon Kim,
Seungjoo Kim,
Kouichi Sakurai,
Dongho Won:
An RFID System Based MCLT System with Improved Privacy.
EUC Workshops 2006: 579-590 |
47 | EE | YoungGyo Lee,
Jeonghee Ahn,
Seungjoo Kim,
Dongho Won:
A PKI System for Detecting the Exposure of a User's Secret Key.
EuroPKI 2006: 248-250 |
46 | EE | He Zheng,
Jin Kwak,
Kyungho Son,
Wansuk Lee,
Seungjoo Kim,
Dongho Won:
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
ICCSA (2) 2006: 954-963 |
45 | EE | Youngsook Lee,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Two Efficient and Secure Authentication Schemes Using Smart Cards.
ICCSA (5) 2006: 858-866 |
44 | EE | Keunwoo Rhee,
Jin Kwak,
Wan S. Yi,
Chanho Park,
Sangjoon Park,
Hyungkyu Yang,
Seungjoo Kim,
Dongho Won:
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.
ICHIT 2006: 607-616 |
43 | EE | Jeeyeon Kim,
Seungjoo Kim,
Kilsoo Chun,
Jaeil Lee,
Dongho Won:
Group Key Agreement Protocol Among Mobile Devices in Different Cells.
ISPA Workshops 2006: 1090-1097 |
42 | EE | Namje Park,
Jin Kwak,
Seungjoo Kim,
Dongho Won,
Howon Kim:
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.
KES (1) 2006: 924-934 |
41 | EE | Yunho Lee,
Heasuk Jo,
Seungjoo Kim,
Dongho Won:
An Efficient Dispute Resolving Method for Digital Images.
OTM Workshops (1) 2006: 331-341 |
40 | EE | Namje Park,
Seungjoo Kim,
Dongho Won,
Howon Kim:
Security Analysis and Implementation Leveraging Globally Networked RFIDs.
PWC 2006: 494-505 |
39 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords.
IEICE Transactions 89-A(1): 209-212 (2006) |
38 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.
IEICE Transactions 89-A(1): 213-218 (2006) |
37 | EE | Yunho Lee,
Seungjoo Kim,
Dongho Won:
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.
IEICE Transactions 89-A(7): 2084-2087 (2006) |
2005 |
36 | EE | Namje Park,
Howon Kim,
Kyoil Chung,
Seungjoo Kim,
Dongho Won:
XKMS-Based Key Management for Open LBS in Web Services Environment.
AWIC 2005: 367-373 |
35 | EE | Namje Park,
Kiyoung Moon,
Howon Kim,
Seungjoo Kim,
Dongho Won:
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid.
EC-Web 2005: 316-326 |
34 | EE | Jin Kwak,
Keunwoo Rhee,
Soohyun Oh,
Seungjoo Kim,
Dongho Won:
RFID System with Fairness Within the Framework of Security and Privacy.
ESAS 2005: 142-152 |
33 | EE | Yunho Lee,
Kwang-Woo Lee,
Seungjoo Kim,
Dongho Won,
Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes.
EUC Workshops 2005: 965-975 |
32 | EE | YoungGyo Lee,
In-Jung Kim,
Seungjoo Kim,
Dongho Won:
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
EuroPKI 2005: 215-226 |
31 | EE | Namje Park,
Kiyoung Moon,
Kyoil Chung,
Seungjoo Kim,
Dongho Won:
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing.
GCC 2005: 323-333 |
30 | EE | Seokhyang Cho,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.
ICCSA (1) 2005: 498-507 |
29 | EE | Namje Park,
Howon Kim,
Seungjoo Kim,
Dongho Won:
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.
ICCSA (2) 2005: 1146-1155 |
28 | EE | Junghyun Nam,
Hyunjue Kim,
Seungjoo Kim,
Dongho Won,
Hyungkyu Yang:
Practical and Provably-Secure Multicasting over High-Delay Networks.
International Conference on Computational Science (2) 2005: 493-501 |
27 | EE | Hyunjue Kim,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV.
PCM (2) 2005: 117-128 |
26 | EE | Keunwoo Rhee,
Jin Kwak,
Seungjoo Kim,
Dongho Won:
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
SPC 2005: 70-84 |
25 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Secure Group Communications over Combined Wired and Wireless Networks.
TrustBus 2005: 90-99 |
24 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
WISA 2005: 1-9 |
23 | EE | Junghyun Nam,
Jinwoo Lee,
Seungjoo Kim,
Dongho Won:
DDH-based group key agreement in a mobile environment.
Journal of Systems and Software 78(1): 73-83 (2005) |
2004 |
22 | EE | Junghyun Nam,
Seokhyang Cho,
Seungjoo Kim,
Dongho Won:
Simple and Efficient Group Key Agreement Based on Factoring.
ICCSA (1) 2004: 645-654 |
21 | EE | Jeeyeon Kim,
Seungjoo Kim,
Jin Kwak,
Dongho Won:
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
ICCSA (1) 2004: 895-902 |
20 | EE | Seungjoo Kim,
Dongho Won:
Threshold Entrusted Undeniable Signature.
ICISC 2004: 195-203 |
2003 |
19 | EE | Seungjoo Kim,
Masahiro Mambo,
Yuliang Zheng:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption.
CT-RSA 2003: 227-243 |
18 | EE | Jung-Yeun Lee,
Jung Hee Cheon,
Seungjoo Kim:
An Analysis of Proxy Signatures: Is a Secure Channel Necessary?
CT-RSA 2003: 68-79 |
17 | EE | Jeeyeon Kim,
Hyunjo Kwon,
Haeryong Park,
Seungjoo Kim,
Dongho Won:
An Improvement of VeriSign's Key Roaming Service Protocol.
ICWE 2003: 281-288 |
16 | EE | Ikkwon Yie,
Seongan Lim,
Seungjoo Kim,
Dongryeol Kim:
Prime Numbers of Diffie-Hellman Groups for IKE-MODP.
INDOCRYPT 2003: 228-234 |
15 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers 52(4): 461-472 (2003) |
14 | EE | Kilsoo Chun,
Seungjoo Kim,
Sangjin Lee,
Soo Hak Sung,
Seonhee Yoon:
Differential and linear cryptanalysis for 2-round SPNs.
Inf. Process. Lett. 87(5): 277-282 (2003) |
2001 |
13 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.
ICISC 2001: 397-413 |
12 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
ICISC 2001: 414-427 |
11 | EE | Seungjoo Kim,
Jung Hee Cheon,
Marc Joye,
Seongan Lim,
Masahiro Mambo,
Dongho Won,
Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
IMA Int. Conf. 2001: 114-127 |
10 | EE | Seongan Lim,
Seungjoo Kim,
Ikkwon Yie,
Jaemoon Kim:
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.
INDOCRYPT 2001: 308-315 |
9 | EE | Seongan Lim,
Seungjoo Kim,
Ikkwon Yie,
Jaemoon Kim,
Hongsub Lee:
XTR Extended to GF(p6m).
Selected Areas in Cryptography 2001: 301-312 |
8 | EE | Jeeyeon Kim,
Seungjoo Kim,
Hyunjo Kwon,
Sungjae Lee,
Sangjoon Park,
Dongho Won:
Forward-Secure Commercial Key Escrow Systems.
WETICE 2001: 211-216 |
2000 |
7 | EE | Seongan Lim,
Seungjoo Kim,
Ikkwon Yie,
Hongsub Lee:
A Generalized Takagi-Cryptosystem with a modulus of the form prqs.
INDOCRYPT 2000: 283-294 |
1999 |
6 | EE | Seungjoo Kim,
Insoo Lee,
Masahiro Mambo,
Sungjun Park:
On the Difficulty of Key Recovery Systems.
ISW 1999: 207-224 |
5 | EE | Marc Joye,
Seungjoo Kim,
Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes.
ISW 1999: 271-275 |
1998 |
4 | | Seungjoo Kim,
Soohyun Oh,
Dongho Won:
One-time self-certified public keys, revisited.
ICISC 1998: 59-69 |
1997 |
3 | | Seungjoo Kim,
Sangjoon Park,
Dongho Won:
Proxy signatures, Revisited.
ICICS 1997: 223-232 |
2 | | Seungjoo Kim,
Sangjoon Park,
Dongho Won:
Group Signatures for Hierarchical Multigroups.
ISW 1997: 273-281 |
1996 |
1 | | Seungjoo Kim,
Sungjun Park,
Dongho Won:
Convertible Group Signatures.
ASIACRYPT 1996: 311-321 |