2009 |
81 | | Won Kim,
Hyung-Jin Choi,
Dongho Won:
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009
ACM 2009 |
80 | EE | Heasuk Jo,
Woongryul Jeon,
Yunho Lee,
Seungjoo Kim,
Dongho Won:
Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
ISPEC 2009: 159-170 |
79 | EE | Juryon Paik,
Junghyun Nam,
Dongho Won,
Ung-Mo Kim:
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
J. Inf. Sci. Eng. 25(2): 435-464 (2009) |
2008 |
78 | EE | Namje Park,
Youjin Song,
Dongho Won,
Howon Kim:
Multilateral Approaches to the Mobile RFID Security Problem Using Web Service.
APWeb 2008: 331-341 |
77 | EE | Youngsook Lee,
Junghyun Nam,
Dongho Won:
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.
KES-AMSTA 2008: 850-857 |
76 | EE | Namje Park,
Youjin Song,
Dongho Won:
Policy and role based mobile RFID user privacy data management system.
NOMS 2008: 1003-1006 |
75 | EE | Namje Park,
Dooho Choi,
Seungjoo Kim,
Dongho Won:
Enforcing security in mobile RFID networks multilateral approaches and solutions.
NOMS 2008: 999-1002 |
74 | EE | Donghyun Choi,
Sungkyu Cho,
Dongho Won,
Seungjoo Kim:
Protection Profile for Connected Interoperable DRM Framework.
WISA 2008: 320-332 |
2007 |
73 | EE | Junghyun Nam,
Juryon Paik,
Ung-Mo Kim,
Dongho Won:
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
ACNS 2007: 158-176 |
72 | EE | Donghyun Choi,
Yunho Lee,
Hogab Kang,
Seungjoo Kim,
Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
ATC 2007: 135-145 |
71 | EE | Namje Park,
Seungjoo Kim,
Dongho Won:
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.
AWIC 2007: 278-283 |
70 | EE | Sangjoon Park,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Efficient Password-Authenticated Key Exchange Based on RSA.
CT-RSA 2007: 309-323 |
69 | EE | Donghwi Shin,
Youngsung Choi,
Yunho Lee,
Sangjoon Park,
Seungjoo Kim,
Dongho Won:
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.
HCI (5) 2007: 547-552 |
68 | EE | Seokhyang Cho,
Kiwon Song,
Dongsub Cho,
Dongho Won:
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification.
ICCSA (2) 2007: 996-1007 |
67 | EE | Junghyun Nam,
Juryon Paik,
Youngsook Lee,
Jin Kwak,
Ung-Mo Kim,
Dongho Won:
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
KES (1) 2007: 672-679 |
66 | EE | YoungGyo Lee,
Jeonghee Ahn,
Seungjoo Kim,
Dongho Won:
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.
KES-AMSTA 2007: 1007-1016 |
65 | EE | Youngsook Lee,
Junghyun Nam,
Jin Kwak,
Dongho Won:
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
KES-AMSTA 2007: 616-625 |
64 | EE | Junghyun Nam,
Seungjoo Kim,
Sangjoon Park,
Dongho Won:
Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards.
IEICE Transactions 90-A(1): 299-302 (2007) |
63 | EE | Junghyun Nam,
Juryon Paik,
Ung-Mo Kim,
Dongho Won:
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci. 177(23): 5441-5467 (2007) |
62 | EE | Junghyun Nam,
Youngsook Lee,
Seungjoo Kim,
Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci. 177(6): 1364-1375 (2007) |
2006 |
61 | | Dongho Won,
Seungjoo Kim:
Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
Springer 2006 |
60 | EE | Namje Park,
Jin Kwak,
Seungjoo Kim,
Dongho Won,
Howon Kim:
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.
APWeb Workshops 2006: 741-748 |
59 | EE | Jin Kwak,
Keunwoo Rhee,
Namje Park,
Howon Kim,
Seungjoo Kim,
Kouichi Sakurai,
Dongho Won:
An RFID System Based MCLT System with Improved Privacy.
EUC Workshops 2006: 579-590 |
58 | EE | Sungduk Kim,
Kyungjin Kim,
Jaedong Jung,
Dongho Won:
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI.
EuroPKI 2006: 223-232 |
57 | EE | YoungGyo Lee,
Jeonghee Ahn,
Seungjoo Kim,
Dongho Won:
A PKI System for Detecting the Exposure of a User's Secret Key.
EuroPKI 2006: 248-250 |
56 | EE | Hyuk Jin Ko,
Dongho Won,
Dong Ryul Shin,
Hyunseung Choo,
Ung-Mo Kim:
A Semantic Context-Aware Access Control in Pervasive Environments.
ICCSA (2) 2006: 165-174 |
55 | EE | Youngsoo Kim,
Taekyong Nam,
Dongho Won:
2-Way Text Classification for Harmful Web Documents.
ICCSA (2) 2006: 545-551 |
54 | EE | He Zheng,
Jin Kwak,
Kyungho Son,
Wansuk Lee,
Seungjoo Kim,
Dongho Won:
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
ICCSA (2) 2006: 954-963 |
53 | EE | Youngsook Lee,
Junghyun Nam,
Dongho Won:
An Inter-domain Key Agreement Protocol Using Weak Passwords.
ICCSA (3) 2006: 517-526 |
52 | EE | In-Jung Kim,
Yoon Jung Chung,
YoungGyo Lee,
Eul-Gyu Im,
Dongho Won:
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
ICCSA (3) 2006: 54-63 |
51 | EE | Yoon Jung Chung,
In-Jung Kim,
Chulsoo Lee,
Eul-Gyu Im,
Dongho Won:
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
ICCSA (4) 2006: 777-786 |
50 | EE | Namje Park,
Howon Kim,
Kyoil Chung,
Sungwon Sohn,
Dongho Won:
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.
ICCSA (5) 2006: 251-259 |
49 | EE | Youngsook Lee,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Two Efficient and Secure Authentication Schemes Using Smart Cards.
ICCSA (5) 2006: 858-866 |
48 | EE | Keunwoo Rhee,
Jin Kwak,
Wan S. Yi,
Chanho Park,
Sangjoon Park,
Hyungkyu Yang,
Seungjoo Kim,
Dongho Won:
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.
ICHIT 2006: 607-616 |
47 | EE | Jeeyeon Kim,
Seungjoo Kim,
Kilsoo Chun,
Jaeil Lee,
Dongho Won:
Group Key Agreement Protocol Among Mobile Devices in Different Cells.
ISPA Workshops 2006: 1090-1097 |
46 | EE | Namje Park,
Jin Kwak,
Seungjoo Kim,
Dongho Won,
Howon Kim:
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.
KES (1) 2006: 924-934 |
45 | EE | Yunho Lee,
Heasuk Jo,
Seungjoo Kim,
Dongho Won:
An Efficient Dispute Resolving Method for Digital Images.
OTM Workshops (1) 2006: 331-341 |
44 | EE | Youngsook Lee,
Junghyun Nam,
Dongho Won:
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards.
OTM Workshops (1) 2006: 508-516 |
43 | EE | Namje Park,
Seungjoo Kim,
Dongho Won,
Howon Kim:
Security Analysis and Implementation Leveraging Globally Networked RFIDs.
PWC 2006: 494-505 |
42 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords.
IEICE Transactions 89-A(1): 209-212 (2006) |
41 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.
IEICE Transactions 89-A(1): 213-218 (2006) |
40 | EE | Yunho Lee,
Seungjoo Kim,
Dongho Won:
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.
IEICE Transactions 89-A(7): 2084-2087 (2006) |
2005 |
39 | EE | Namje Park,
Howon Kim,
Kyoil Chung,
Seungjoo Kim,
Dongho Won:
XKMS-Based Key Management for Open LBS in Web Services Environment.
AWIC 2005: 367-373 |
38 | EE | Namje Park,
Kiyoung Moon,
Howon Kim,
Seungjoo Kim,
Dongho Won:
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid.
EC-Web 2005: 316-326 |
37 | EE | Jin Kwak,
Keunwoo Rhee,
Soohyun Oh,
Seungjoo Kim,
Dongho Won:
RFID System with Fairness Within the Framework of Security and Privacy.
ESAS 2005: 142-152 |
36 | EE | Yunho Lee,
Kwang-Woo Lee,
Seungjoo Kim,
Dongho Won,
Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes.
EUC Workshops 2005: 965-975 |
35 | EE | YoungGyo Lee,
In-Jung Kim,
Seungjoo Kim,
Dongho Won:
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
EuroPKI 2005: 215-226 |
34 | EE | Namje Park,
Kiyoung Moon,
Kyoil Chung,
Seungjoo Kim,
Dongho Won:
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing.
GCC 2005: 323-333 |
33 | EE | Seokhyang Cho,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.
ICCSA (1) 2005: 498-507 |
32 | EE | Namje Park,
Kiyoung Moon,
Jongsu Jang,
Sungwon Sohn,
Dongho Won:
Implementation of Streamlining PKI System for Web Services.
ICCSA (1) 2005: 609-618 |
31 | EE | Namje Park,
Howon Kim,
Seungjoo Kim,
Dongho Won:
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.
ICCSA (2) 2005: 1146-1155 |
30 | EE | In-Jung Kim,
Yoon Jung Chung,
YoungGyo Lee,
Dongho Won:
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.
ICCSA (2) 2005: 92-101 |
29 | EE | Namje Park,
Kiyoung Moon,
Kyoil Chung,
Dongho Won,
Yuliang Zheng:
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services.
ICWE 2005: 191-196 |
28 | EE | Juryon Paik,
Dongho Won,
Farshad Fotouhi,
Ung-Mo Kim:
EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data.
IDEAL 2005: 1-8 |
27 | EE | Junghyun Nam,
Hyunjue Kim,
Seungjoo Kim,
Dongho Won,
Hyungkyu Yang:
Practical and Provably-Secure Multicasting over High-Delay Networks.
International Conference on Computational Science (2) 2005: 493-501 |
26 | EE | Hyunjue Kim,
Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV.
PCM (2) 2005: 117-128 |
25 | EE | Keunwoo Rhee,
Jin Kwak,
Seungjoo Kim,
Dongho Won:
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
SPC 2005: 70-84 |
24 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Secure Group Communications over Combined Wired and Wireless Networks.
TrustBus 2005: 90-99 |
23 | EE | Junghyun Nam,
Seungjoo Kim,
Dongho Won:
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
WISA 2005: 1-9 |
22 | EE | Junghyun Nam,
Jinwoo Lee,
Seungjoo Kim,
Dongho Won:
DDH-based group key agreement in a mobile environment.
Journal of Systems and Software 78(1): 73-83 (2005) |
2004 |
21 | EE | Junghyun Nam,
Seokhyang Cho,
Seungjoo Kim,
Dongho Won:
Simple and Efficient Group Key Agreement Based on Factoring.
ICCSA (1) 2004: 645-654 |
20 | EE | Jeeyeon Kim,
Seungjoo Kim,
Jin Kwak,
Dongho Won:
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
ICCSA (1) 2004: 895-902 |
19 | EE | Jin Kwak,
Jongsu Han,
Soohyun Oh,
Dongho Won:
Security Enhanced WTLS Handshake Protocol.
ICCSA (3) 2004: 955-964 |
18 | EE | Seungjoo Kim,
Dongho Won:
Threshold Entrusted Undeniable Signature.
ICISC 2004: 195-203 |
17 | EE | Jin Kwak,
Soohyun Oh,
Dongho Won:
Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.
PARA 2004: 1009-1016 |
16 | | In-Jung Kim,
Yoon-Jung Jung,
JoongGil Park,
Dongho Won:
A Study on Security Risk Modeling over Information and Communication Infrastructure.
Security and Management 2004: 249-253 |
2003 |
15 | EE | Soohyun Oh,
Jin Kwak,
Seungwoo Lee,
Dongho Won:
Security Analysis and Applications of Standard Key Agreement Protocols.
ICCSA (2) 2003: 191-200 |
14 | EE | Soohyun Oh,
Jin Kwak,
Dongho Won:
An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity.
ICOIN 2003: 737-746 |
13 | EE | Jeeyeon Kim,
Hyunjo Kwon,
Haeryong Park,
Seungjoo Kim,
Dongho Won:
An Improvement of VeriSign's Key Roaming Service Protocol.
ICWE 2003: 281-288 |
12 | | Hee Bong Choi,
Hyoon Jae Lee,
Choon Su Kim,
Byung Hwa Chang,
Dongho Won:
On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards.
Security and Management 2003: 260-266 |
2001 |
11 | | Dongho Won:
Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings
Springer 2001 |
10 | EE | Dug-Hwan Choi,
Seungbok Choi,
Dongho Won:
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.
ICISC 2001: 72-80 |
9 | EE | Seungjoo Kim,
Jung Hee Cheon,
Marc Joye,
Seongan Lim,
Masahiro Mambo,
Dongho Won,
Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
IMA Int. Conf. 2001: 114-127 |
8 | EE | Jeeyeon Kim,
Seungjoo Kim,
Hyunjo Kwon,
Sungjae Lee,
Sangjoon Park,
Dongho Won:
Forward-Secure Commercial Key Escrow Systems.
WETICE 2001: 211-216 |
2000 |
7 | EE | Chanjoo Chung,
Seungbok Choi,
Youngchul Choi,
Dongho Won:
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors.
ICISC 2000: 221-234 |
1999 |
6 | | Hyoungkyu Lee,
Dongho Won,
Kiwook Sohn,
Hyoungkyu Yang:
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.
ICISC 1999: 147-155 |
1998 |
5 | | Seungjoo Kim,
Soohyun Oh,
Dongho Won:
One-time self-certified public keys, revisited.
ICISC 1998: 59-69 |
1997 |
4 | | Sangjoon Park,
Sangwoo Park,
Kwangjo Kim,
Dongho Won:
Two efficient RSA multisignature schemes.
ICICS 1997: 217-222 |
3 | | Seungjoo Kim,
Sangjoon Park,
Dongho Won:
Proxy signatures, Revisited.
ICICS 1997: 223-232 |
2 | | Seungjoo Kim,
Sangjoon Park,
Dongho Won:
Group Signatures for Hierarchical Multigroups.
ISW 1997: 273-281 |
1996 |
1 | | Seungjoo Kim,
Sungjun Park,
Dongho Won:
Convertible Group Signatures.
ASIACRYPT 1996: 311-321 |