2009 | ||
---|---|---|
81 | Won Kim, Hyung-Jin Choi, Dongho Won: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009 ACM 2009 | |
80 | EE | Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won: Security Specification for Conversion Technologies of Heterogeneous DRM Systems. ISPEC 2009: 159-170 |
79 | EE | Juryon Paik, Junghyun Nam, Dongho Won, Ung-Mo Kim: Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. J. Inf. Sci. Eng. 25(2): 435-464 (2009) |
2008 | ||
78 | EE | Namje Park, Youjin Song, Dongho Won, Howon Kim: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. APWeb 2008: 331-341 |
77 | EE | Youngsook Lee, Junghyun Nam, Dongho Won: Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. KES-AMSTA 2008: 850-857 |
76 | EE | Namje Park, Youjin Song, Dongho Won: Policy and role based mobile RFID user privacy data management system. NOMS 2008: 1003-1006 |
75 | EE | Namje Park, Dooho Choi, Seungjoo Kim, Dongho Won: Enforcing security in mobile RFID networks multilateral approaches and solutions. NOMS 2008: 999-1002 |
74 | EE | Donghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim: Protection Profile for Connected Interoperable DRM Framework. WISA 2008: 320-332 |
2007 | ||
73 | EE | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won: Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. ACNS 2007: 158-176 |
72 | EE | Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won: An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. ATC 2007: 135-145 |
71 | EE | Namje Park, Seungjoo Kim, Dongho Won: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. AWIC 2007: 278-283 |
70 | EE | Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won: Efficient Password-Authenticated Key Exchange Based on RSA. CT-RSA 2007: 309-323 |
69 | EE | Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won: Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. HCI (5) 2007: 547-552 |
68 | EE | Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won: Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. ICCSA (2) 2007: 996-1007 |
67 | EE | Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won: Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. KES (1) 2007: 672-679 |
66 | EE | YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won: A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. KES-AMSTA 2007: 1007-1016 |
65 | EE | Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won: Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. KES-AMSTA 2007: 616-625 |
64 | EE | Junghyun Nam, Seungjoo Kim, Sangjoon Park, Dongho Won: Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards. IEICE Transactions 90-A(1): 299-302 (2007) |
63 | EE | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won: Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. Inf. Sci. 177(23): 5441-5467 (2007) |
62 | EE | Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won: Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf. Sci. 177(6): 1364-1375 (2007) |
2006 | ||
61 | Dongho Won, Seungjoo Kim: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Springer 2006 | |
60 | EE | Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748 |
59 | EE | Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 |
58 | EE | Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won: An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. EuroPKI 2006: 223-232 |
57 | EE | YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won: A PKI System for Detecting the Exposure of a User's Secret Key. EuroPKI 2006: 248-250 |
56 | EE | Hyuk Jin Ko, Dongho Won, Dong Ryul Shin, Hyunseung Choo, Ung-Mo Kim: A Semantic Context-Aware Access Control in Pervasive Environments. ICCSA (2) 2006: 165-174 |
55 | EE | Youngsoo Kim, Taekyong Nam, Dongho Won: 2-Way Text Classification for Harmful Web Documents. ICCSA (2) 2006: 545-551 |
54 | EE | He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won: Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ICCSA (2) 2006: 954-963 |
53 | EE | Youngsook Lee, Junghyun Nam, Dongho Won: An Inter-domain Key Agreement Protocol Using Weak Passwords. ICCSA (3) 2006: 517-526 |
52 | EE | In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won: Information System Modeling for Analysis of Propagation Effects and Levels of Damage. ICCSA (3) 2006: 54-63 |
51 | EE | Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won: Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. ICCSA (4) 2006: 777-786 |
50 | EE | Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won: XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. ICCSA (5) 2006: 251-259 |
49 | EE | Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won: Two Efficient and Secure Authentication Schemes Using Smart Cards. ICCSA (5) 2006: 858-866 |
48 | EE | Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won: Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. ICHIT 2006: 607-616 |
47 | EE | Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won: Group Key Agreement Protocol Among Mobile Devices in Different Cells. ISPA Workshops 2006: 1090-1097 |
46 | EE | Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934 |
45 | EE | Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won: An Efficient Dispute Resolving Method for Digital Images. OTM Workshops (1) 2006: 331-341 |
44 | EE | Youngsook Lee, Junghyun Nam, Dongho Won: Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. OTM Workshops (1) 2006: 508-516 |
43 | EE | Namje Park, Seungjoo Kim, Dongho Won, Howon Kim: Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505 |
42 | EE | Junghyun Nam, Seungjoo Kim, Dongho Won: Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Transactions 89-A(1): 209-212 (2006) |
41 | EE | Junghyun Nam, Seungjoo Kim, Dongho Won: Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme. IEICE Transactions 89-A(1): 213-218 (2006) |
40 | EE | Yunho Lee, Seungjoo Kim, Dongho Won: Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol. IEICE Transactions 89-A(7): 2084-2087 (2006) |
2005 | ||
39 | EE | Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won: XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373 |
38 | EE | Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won: XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326 |
37 | EE | Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won: RFID System with Fairness Within the Framework of Security and Privacy. ESAS 2005: 142-152 |
36 | EE | Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang: A Method for Deciding Quantization Steps in QIM Watermarking Schemes. EUC Workshops 2005: 965-975 |
35 | EE | YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won: A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. EuroPKI 2005: 215-226 |
34 | EE | Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won: XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. GCC 2005: 323-333 |
33 | EE | Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won: An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. ICCSA (1) 2005: 498-507 |
32 | EE | Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn, Dongho Won: Implementation of Streamlining PKI System for Web Services. ICCSA (1) 2005: 609-618 |
31 | EE | Namje Park, Howon Kim, Seungjoo Kim, Dongho Won: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155 |
30 | EE | In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won: A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. ICCSA (2) 2005: 92-101 |
29 | EE | Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng: A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. ICWE 2005: 191-196 |
28 | EE | Juryon Paik, Dongho Won, Farshad Fotouhi, Ung-Mo Kim: EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. IDEAL 2005: 1-8 |
27 | EE | Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang: Practical and Provably-Secure Multicasting over High-Delay Networks. International Conference on Computational Science (2) 2005: 493-501 |
26 | EE | Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won: Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. PCM (2) 2005: 117-128 |
25 | EE | Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. SPC 2005: 70-84 |
24 | EE | Junghyun Nam, Seungjoo Kim, Dongho Won: Secure Group Communications over Combined Wired and Wireless Networks. TrustBus 2005: 90-99 |
23 | EE | Junghyun Nam, Seungjoo Kim, Dongho Won: Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. WISA 2005: 1-9 |
22 | EE | Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won: DDH-based group key agreement in a mobile environment. Journal of Systems and Software 78(1): 73-83 (2005) |
2004 | ||
21 | EE | Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won: Simple and Efficient Group Key Agreement Based on Factoring. ICCSA (1) 2004: 645-654 |
20 | EE | Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won: Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ICCSA (1) 2004: 895-902 |
19 | EE | Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won: Security Enhanced WTLS Handshake Protocol. ICCSA (3) 2004: 955-964 |
18 | EE | Seungjoo Kim, Dongho Won: Threshold Entrusted Undeniable Signature. ICISC 2004: 195-203 |
17 | EE | Jin Kwak, Soohyun Oh, Dongho Won: Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. PARA 2004: 1009-1016 |
16 | In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won: A Study on Security Risk Modeling over Information and Communication Infrastructure. Security and Management 2004: 249-253 | |
2003 | ||
15 | EE | Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won: Security Analysis and Applications of Standard Key Agreement Protocols. ICCSA (2) 2003: 191-200 |
14 | EE | Soohyun Oh, Jin Kwak, Dongho Won: An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. ICOIN 2003: 737-746 |
13 | EE | Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won: An Improvement of VeriSign's Key Roaming Service Protocol. ICWE 2003: 281-288 |
12 | Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won: On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. Security and Management 2003: 260-266 | |
2001 | ||
11 | Dongho Won: Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings Springer 2001 | |
10 | EE | Dug-Hwan Choi, Seungbok Choi, Dongho Won: Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. ICISC 2001: 72-80 |
9 | EE | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127 |
8 | EE | Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won: Forward-Secure Commercial Key Escrow Systems. WETICE 2001: 211-216 |
2000 | ||
7 | EE | Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won: Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. ICISC 2000: 221-234 |
1999 | ||
6 | Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang: Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. ICISC 1999: 147-155 | |
1998 | ||
5 | Seungjoo Kim, Soohyun Oh, Dongho Won: One-time self-certified public keys, revisited. ICISC 1998: 59-69 | |
1997 | ||
4 | Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won: Two efficient RSA multisignature schemes. ICICS 1997: 217-222 | |
3 | Seungjoo Kim, Sangjoon Park, Dongho Won: Proxy signatures, Revisited. ICICS 1997: 223-232 | |
2 | Seungjoo Kim, Sangjoon Park, Dongho Won: Group Signatures for Hierarchical Multigroups. ISW 1997: 273-281 | |
1996 | ||
1 | Seungjoo Kim, Sungjun Park, Dongho Won: Convertible Group Signatures. ASIACRYPT 1996: 311-321 |