2009 |
10 | EE | Ik Rae Jeong,
Jeong Ok Kwon,
Dowon Hong,
Dong Hoon Lee:
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Computer Communications 32(2): 394-396 (2009) |
2008 |
9 | EE | Ik Rae Jeong,
Jeong Ok Kwon,
Dong Hoon Lee:
Ring Signature with Weak Linkability and Its Applications.
IEEE Trans. Knowl. Data Eng. 20(8): 1145-1148 (2008) |
8 | EE | Ik Rae Jeong,
Jeong Ok Kwon,
Dong Hoon Lee:
Strong ID-Based Key Distribution.
IEICE Transactions 91-B(1): 306-308 (2008) |
2007 |
7 | EE | Ik Rae Jeong,
Jeong Ok Kwon,
Dong Hoon Lee:
On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing.
IEICE Transactions 90-A(11): 2626-2628 (2007) |
6 | EE | Jeong Ok Kwon,
Ik Rae Jeong,
Dong Hoon Lee:
Three-Round Smart Card-Based Key Exchange Scheme.
IEICE Transactions 90-B(11): 3255-3258 (2007) |
2006 |
5 | EE | Ik Rae Jeong,
Jeong Ok Kwon,
Dong Hoon Lee:
A Diffie-Hellman Key Exchange Protocol Without Random Oracles.
CANS 2006: 37-54 |
4 | EE | Jeong Ok Kwon,
Kouichi Sakurai,
Dong Hoon Lee:
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.
Communications and Multimedia Security 2006: 87-96 |
3 | EE | Jeong Ok Kwon,
Ik Rae Jeong,
Dong Hoon Lee:
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.
IWSEC 2006: 322-336 |
2 | EE | Jeong Ok Kwon,
Kouichi Sakurai,
Dong Hoon Lee:
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
International Conference on Computational Science (1) 2006: 977-980 |
2005 |
1 | EE | Jeong Ok Kwon,
Jung Yeon Hwang,
Changwook Kim,
Dong Hoon Lee:
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme.
Applied Mathematics and Computation 168(2): 858-865 (2005) |