dblp.uni-trier.dewww.uni-trier.de

Dongho Won

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
81 Won Kim, Hyung-Jin Choi, Dongho Won: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009 ACM 2009
80EEHeasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won: Security Specification for Conversion Technologies of Heterogeneous DRM Systems. ISPEC 2009: 159-170
79EEJuryon Paik, Junghyun Nam, Dongho Won, Ung-Mo Kim: Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. J. Inf. Sci. Eng. 25(2): 435-464 (2009)
2008
78EENamje Park, Youjin Song, Dongho Won, Howon Kim: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. APWeb 2008: 331-341
77EEYoungsook Lee, Junghyun Nam, Dongho Won: Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. KES-AMSTA 2008: 850-857
76EENamje Park, Youjin Song, Dongho Won: Policy and role based mobile RFID user privacy data management system. NOMS 2008: 1003-1006
75EENamje Park, Dooho Choi, Seungjoo Kim, Dongho Won: Enforcing security in mobile RFID networks multilateral approaches and solutions. NOMS 2008: 999-1002
74EEDonghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim: Protection Profile for Connected Interoperable DRM Framework. WISA 2008: 320-332
2007
73EEJunghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won: Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. ACNS 2007: 158-176
72EEDonghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won: An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. ATC 2007: 135-145
71EENamje Park, Seungjoo Kim, Dongho Won: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. AWIC 2007: 278-283
70EESangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won: Efficient Password-Authenticated Key Exchange Based on RSA. CT-RSA 2007: 309-323
69EEDonghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won: Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. HCI (5) 2007: 547-552
68EESeokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won: Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. ICCSA (2) 2007: 996-1007
67EEJunghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won: Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. KES (1) 2007: 672-679
66EEYoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won: A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. KES-AMSTA 2007: 1007-1016
65EEYoungsook Lee, Junghyun Nam, Jin Kwak, Dongho Won: Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. KES-AMSTA 2007: 616-625
64EEJunghyun Nam, Seungjoo Kim, Sangjoon Park, Dongho Won: Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards. IEICE Transactions 90-A(1): 299-302 (2007)
63EEJunghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won: Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. Inf. Sci. 177(23): 5441-5467 (2007)
62EEJunghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won: Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf. Sci. 177(6): 1364-1375 (2007)
2006
61 Dongho Won, Seungjoo Kim: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Springer 2006
60EENamje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748
59EEJin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590
58EESungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won: An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. EuroPKI 2006: 223-232
57EEYoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won: A PKI System for Detecting the Exposure of a User's Secret Key. EuroPKI 2006: 248-250
56EEHyuk Jin Ko, Dongho Won, Dong Ryul Shin, Hyunseung Choo, Ung-Mo Kim: A Semantic Context-Aware Access Control in Pervasive Environments. ICCSA (2) 2006: 165-174
55EEYoungsoo Kim, Taekyong Nam, Dongho Won: 2-Way Text Classification for Harmful Web Documents. ICCSA (2) 2006: 545-551
54EEHe Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won: Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ICCSA (2) 2006: 954-963
53EEYoungsook Lee, Junghyun Nam, Dongho Won: An Inter-domain Key Agreement Protocol Using Weak Passwords. ICCSA (3) 2006: 517-526
52EEIn-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won: Information System Modeling for Analysis of Propagation Effects and Levels of Damage. ICCSA (3) 2006: 54-63
51EEYoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won: Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. ICCSA (4) 2006: 777-786
50EENamje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won: XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. ICCSA (5) 2006: 251-259
49EEYoungsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won: Two Efficient and Secure Authentication Schemes Using Smart Cards. ICCSA (5) 2006: 858-866
48EEKeunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won: Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. ICHIT 2006: 607-616
47EEJeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won: Group Key Agreement Protocol Among Mobile Devices in Different Cells. ISPA Workshops 2006: 1090-1097
46EENamje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934
45EEYunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won: An Efficient Dispute Resolving Method for Digital Images. OTM Workshops (1) 2006: 331-341
44EEYoungsook Lee, Junghyun Nam, Dongho Won: Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. OTM Workshops (1) 2006: 508-516
43EENamje Park, Seungjoo Kim, Dongho Won, Howon Kim: Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505
42EEJunghyun Nam, Seungjoo Kim, Dongho Won: Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Transactions 89-A(1): 209-212 (2006)
41EEJunghyun Nam, Seungjoo Kim, Dongho Won: Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme. IEICE Transactions 89-A(1): 213-218 (2006)
40EEYunho Lee, Seungjoo Kim, Dongho Won: Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol. IEICE Transactions 89-A(7): 2084-2087 (2006)
2005
39EENamje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won: XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373
38EENamje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won: XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326
37EEJin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won: RFID System with Fairness Within the Framework of Security and Privacy. ESAS 2005: 142-152
36EEYunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang: A Method for Deciding Quantization Steps in QIM Watermarking Schemes. EUC Workshops 2005: 965-975
35EEYoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won: A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. EuroPKI 2005: 215-226
34EENamje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won: XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. GCC 2005: 323-333
33EESeokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won: An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. ICCSA (1) 2005: 498-507
32EENamje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn, Dongho Won: Implementation of Streamlining PKI System for Web Services. ICCSA (1) 2005: 609-618
31EENamje Park, Howon Kim, Seungjoo Kim, Dongho Won: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155
30EEIn-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won: A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. ICCSA (2) 2005: 92-101
29EENamje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng: A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. ICWE 2005: 191-196
28EEJuryon Paik, Dongho Won, Farshad Fotouhi, Ung-Mo Kim: EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. IDEAL 2005: 1-8
27EEJunghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang: Practical and Provably-Secure Multicasting over High-Delay Networks. International Conference on Computational Science (2) 2005: 493-501
26EEHyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won: Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. PCM (2) 2005: 117-128
25EEKeunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. SPC 2005: 70-84
24EEJunghyun Nam, Seungjoo Kim, Dongho Won: Secure Group Communications over Combined Wired and Wireless Networks. TrustBus 2005: 90-99
23EEJunghyun Nam, Seungjoo Kim, Dongho Won: Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. WISA 2005: 1-9
22EEJunghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won: DDH-based group key agreement in a mobile environment. Journal of Systems and Software 78(1): 73-83 (2005)
2004
21EEJunghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won: Simple and Efficient Group Key Agreement Based on Factoring. ICCSA (1) 2004: 645-654
20EEJeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won: Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ICCSA (1) 2004: 895-902
19EEJin Kwak, Jongsu Han, Soohyun Oh, Dongho Won: Security Enhanced WTLS Handshake Protocol. ICCSA (3) 2004: 955-964
18EESeungjoo Kim, Dongho Won: Threshold Entrusted Undeniable Signature. ICISC 2004: 195-203
17EEJin Kwak, Soohyun Oh, Dongho Won: Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. PARA 2004: 1009-1016
16 In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won: A Study on Security Risk Modeling over Information and Communication Infrastructure. Security and Management 2004: 249-253
2003
15EESoohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won: Security Analysis and Applications of Standard Key Agreement Protocols. ICCSA (2) 2003: 191-200
14EESoohyun Oh, Jin Kwak, Dongho Won: An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. ICOIN 2003: 737-746
13EEJeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won: An Improvement of VeriSign's Key Roaming Service Protocol. ICWE 2003: 281-288
12 Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won: On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. Security and Management 2003: 260-266
2001
11 Dongho Won: Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings Springer 2001
10EEDug-Hwan Choi, Seungbok Choi, Dongho Won: Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. ICISC 2001: 72-80
9EESeungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127
8EEJeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won: Forward-Secure Commercial Key Escrow Systems. WETICE 2001: 211-216
2000
7EEChanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won: Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. ICISC 2000: 221-234
1999
6 Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang: Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. ICISC 1999: 147-155
1998
5 Seungjoo Kim, Soohyun Oh, Dongho Won: One-time self-certified public keys, revisited. ICISC 1998: 59-69
1997
4 Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won: Two efficient RSA multisignature schemes. ICICS 1997: 217-222
3 Seungjoo Kim, Sangjoon Park, Dongho Won: Proxy signatures, Revisited. ICICS 1997: 223-232
2 Seungjoo Kim, Sangjoon Park, Dongho Won: Group Signatures for Hierarchical Multigroups. ISW 1997: 273-281
1996
1 Seungjoo Kim, Sungjun Park, Dongho Won: Convertible Group Signatures. ASIACRYPT 1996: 311-321

Coauthor Index

1Jeonghee Ahn [57] [66]
2Byung Hwa Chang [12]
3Jung Hee Cheon [9]
4Dongsub Cho [68]
5Seokhyang Cho [21] [33] [68]
6Sungkyu Cho [74]
7Donghyun Choi [72] [74]
8Dooho Choi [75]
9Dug-Hwan Choi [10]
10Hee Bong Choi [12]
11Hyung-Jin Choi [81]
12Seungbok Choi [7] [10]
13Youngchul Choi [7]
14Youngsung Choi [69]
15Hyunseung Choo [56]
16Kilsoo Chun [47]
17Chanjoo Chung [7]
18Kyoil Chung [29] [34] [39] [50]
19Yoon Jung Chung [30] [51] [52]
20Farshad Fotouhi [28]
21Jongsu Han [19]
22Eul-Gyu Im [51] [52]
23Jongsu Jang [32]
24Woongryul Jeon [80]
25Heasuk Jo [45] [80]
26Marc Joye [9]
27Jaedong Jung [58]
28Yoon-Jung Jung [16]
29Hogab Kang [72]
30Choon Su Kim [12]
31Howon Kim (Ho Won Kim) [31] [38] [39] [43] [46] [50] [59] [60] [78]
32Hyunjue Kim [26] [27]
33In-Jung Kim [16] [30] [35] [51] [52]
34Jeeyeon Kim [8] [13] [20] [47]
35Kwangjo Kim [4]
36Kyungjin Kim [58]
37Seungjoo Kim [1] [2] [3] [5] [8] [9] [13] [18] [20] [21] [22] [23] [24] [25] [26] [27] [31] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [45] [46] [47] [48] [49] [54] [57] [59] [60] [61] [62] [64] [66] [69] [70] [71] [72] [74] [75] [80]
38Sungduk Kim [58]
39Ung-Mo Kim [28] [56] [63] [67] [73] [79]
40Won Kim [81]
41Youngsoo Kim [55]
42Hyuk Jin Ko [56]
43Jin Kwak [14] [15] [17] [19] [20] [25] [37] [46] [48] [54] [59] [60] [65] [67]
44Hyunjo Kwon [8] [13]
45Chulsoo Lee [51]
46Hyoon Jae Lee [12]
47Hyoungkyu Lee [6]
48Jaeil Lee [47]
49Jinwoo Lee [22]
50Kwang-Woo Lee [36]
51Seungwoo Lee [15]
52Sungjae Lee [8]
53Wansuk Lee [54]
54YoungGyo Lee [30] [35] [52] [57] [66]
55Youngsook Lee [44] [49] [53] [62] [65] [67] [77]
56Yunho Lee [36] [40] [45] [69] [72] [80]
57Seongan Lim [9]
58Masahiro Mambo [9]
59Kiyoung Moon [29] [32] [34] [38]
60Junghyun Nam [21] [22] [23] [24] [26] [27] [33] [41] [42] [44] [49] [53] [62] [63] [64] [65] [67] [70] [73] [77] [79]
61Taekyong Nam [55]
62Soohyun Oh [5] [14] [15] [17] [19] [37]
63Juryon Paik [28] [63] [67] [73] [79]
64Chanho Park [48]
65Haeryong Park [13]
66JoongGil Park [16]
67Namje Park [29] [31] [32] [34] [38] [39] [43] [46] [50] [59] [60] [71] [75] [76] [78]
68Sangjoon Park [2] [3] [4] [8] [48] [64] [69] [70]
69Sangwoo Park [4]
70Sungjun Park [1]
71Keunwoo Rhee [25] [37] [48] [59]
72Kouichi Sakurai [59]
73Dong Ryul Shin [56]
74Donghwi Shin [69]
75Kiwook Sohn [6]
76Sungwon Sohn [32] [50]
77Kyungho Son [54]
78Kiwon Song [68]
79Youjin Song [76] [78]
80Hyoungkyu Yang [6]
81Hyungkyu Yang [27] [36] [48]
82Wan S. Yi [48]
83He Zheng [54]
84Yuliang Zheng [9] [29]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)