Dongho Won

According to our database1, Dongho Won authored at least 241 papers between 1996 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A three-factor anonymous user authentication scheme for Internet of Things environments.
J. Inf. Secur. Appl., 2020

Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

2018
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.
Sensors, 2018

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018

Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme.
Proceedings of the 2018 International Conference on Information Networking, 2018

Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
Proceedings of the 2018 International Conference on Information Networking, 2018

Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

2017
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
Sensors, 2017

Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
Sensors, 2017

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Secur. Commun. Networks, 2017

Software Birthmark Method Using Combined Structure-Based and API-Based.
J. Softw., 2017

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
KSII Trans. Internet Inf. Syst., 2017

Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017

Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

An enhanced unlinkable anonymous payment scheme based on near field commnication.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

2016
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
Sensors, 2016

An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
Sensors, 2016

Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
Secur. Commun. Networks, 2016

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
J. Sensors, 2016

An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2016

An Improvement of User Authentication Framework for Cloud Computing.
J. Comput., 2016

Forward Anonymity-Preserving Secure Remote Authentication Scheme.
KSII Trans. Internet Inf. Syst., 2016

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.
Int. J. Distributed Sens. Networks, 2016

API-Based Software Birthmarking Method Using Fuzzy Hashing.
IEICE Trans. Inf. Syst., 2016

Improvement and Weakness of <i>Zero-Sum Defender</i> against Return-Oriented Programming Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Performance and security enhanced authentication and key agreement protocol for SAE/LTE network.
Comput. Networks, 2016

Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE).
Symmetry, 2015

Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.
Int. J. Distributed Sens. Networks, 2015

Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property.
IEICE Trans. Commun., 2015

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015

Cryptanalysis of biometric-based multi-server authentication scheme using smart card.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Security Improvement of Portable Key Management Using a Mobile Phone.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Secure Deletion for Flash-Based Self-Encrypting Drives.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Association Rule Extraction from XML Stream Data for Wireless Sensor Networks.
Sensors, 2014

A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks.
Sensors, 2014

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014

Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014

Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System.
IACR Cryptol. ePrint Arch., 2014

An enhanced remote user authentication scheme using smart card.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Password-based single-file encryption and secure data deletion for solid-state drive.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013

Guest Editorial.
J. Softw., 2013

Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea.
J. Softw., 2013

Hybrid Key Management Architecture for Robust SCADA Systems.
J. Inf. Sci. Eng., 2013

Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013

An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2013

On the security of a password-only authenticated three-party key exchange protocol.
IACR Cryptol. ePrint Arch., 2013

Threat modeling of a mobile device management system for secure smart work.
Electron. Commer. Res., 2013

Protection Profile for PoS (Point of Sale) System.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Scalable Key Management for Dynamic Group in Multi-cast Communication.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

A secure user-friendly authentication scheme with anonymity for wireless communications.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

An Improvement of Secure Remote User Authentication Scheme Using Smart Cards.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

High-Level Design for a Secure Mobile Device Management System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Security Requirement of End Point Security Software.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Scalable Group Key Exchange for Securing Distributed Operating Systems.
J. Inf. Sci. Eng., 2012

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
KSII Trans. Internet Inf. Syst., 2012

A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards.
IEICE Trans. Commun., 2012

An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments.
IEICE Trans. Commun., 2012

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Database Encryption Implementation and Analysis Using Graphics Processing Unit.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

A method for secure and efficient block cipher using white-box cryptography.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

On the security of an novel protocol for downloadable CAS.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques.
Proceedings of the Convergence and Hybrid Information Technology, 2012

Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Enhanced Password-Based User Authentication Using Smart Phone.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A Study on Method to Analyze Application on Bada Using GUI without Source Code.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Secure Data Deletion for USB Flash Memory.
J. Inf. Sci. Eng., 2011

Advanced Information Security Management Evaluation System.
KSII Trans. Internet Inf. Syst., 2011

A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol.
Inf. Sci., 2011

Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011

An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Analysis and countermeasures of security vulnerability on portal sites.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Malware Variant Detection and Classification Using Control Flow Graph.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An Improved Protocol for Server-Aided Authenticated Group Key Establishment.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Security Improvement on a Group Key Exchange Protocol for Mobile Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Analysis of Content Filtering Software.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

A Practical Analysis of Smartphone Security.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File.
Proceedings of the Future Generation Information Technology, 2011

Security Analysis on Digital Signature Function Implemented in PDF Software.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Future Generation Information Technology, 2011

USN Middleware Access Control of Sensor Network and Selective Encryption of Information.
Proceedings of the Future Generation Information Technology, 2011

A Study on the Secure Home Healthcare Wireless Service.
Proceedings of the Future Generation Information Technology, 2011

Protection Profile for Data Leakage Protection System.
Proceedings of the Future Generation Information Technology, 2011

Information Technology Security Evaluation Using CERT C Secure Coding Standard.
Proceedings of the Future Generation Information Technology, 2011

Enhanced Code-Signing Scheme for Smartphone Applications.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of the User Authentication Scheme with Anonymity.
Proceedings of the Future Generation Information Technology, 2011

An Improved Anonymous Electronic Prescription Scheme.
Proceedings of the Future Generation Information Technology, 2011

An improved key establishment scheme for wireless sensor network.
Proceedings of the 6th International Conference on Future Internet Technologies, 2011

2010
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
J. Inf. Sci. Eng., 2010

Towards trustworthy e-voting using paper receipts.
Comput. Stand. Interfaces, 2010

Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.
Comput. Electr. Eng., 2010

An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Automated DCI compliance test system for Digital Cinema Entities.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.
Proceedings of the Information Security, 2010

Protection Profile for Secure E-Voting Systems.
Proceedings of the Information Security, 2010

A Trustworthy ID Management Mechanism in Open Market.
Proceedings of the Information Security, 2010

A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), .
Proceedings of the Information Security, 2010

Security analysis on commercial online music streaming service and countermeasures.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A Study on Comparative Analysis of the Information Security Management Systems.
Proceedings of the Computational Science and Its Applications, 2010

2009
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
J. Inf. Sci. Eng., 2009

An off-line dictionary attack on a simple three-party key exchange protocol.
IEEE Commun. Lett., 2009

Enhancing of a Password-Based Authentication Scheme Using Smart Cards.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
Proceedings of the Information Security Practice and Experience, 2009

Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.
Proceedings of the Computational Science and Its Applications, 2009

Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.
Proceedings of the Computational Science and Its Applications, 2009

A Practical Approach to a Reliable Electronic Election.
Proceedings of the Computational Science and Its Applications, 2009

Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Computational Science and Its Applications, 2009

Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme.
Proceedings of the Communication and Networking, 2009

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

Fingerprint Based Secure Authentication Protocol using OTP in e-Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009

Cipher Suite Setting Problem of SSL Protocol and it's Solutions.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008

Protection Profile for Connected Interoperable DRM Framework.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Policy and role based mobile RFID user privacy data management system.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Enforcing security in mobile RFID networks multilateral approaches and solutions.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Security Weaknesses in Chang and Wu's Key Agreement Protocol for a Multi-Server Environment.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

How to Trust DRE Voting Machines Preserving Voter Privacy.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

The Vulnerabilities Analysis of Fuzzy Vault Using Password.
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008

Multilateral Approaches to the Mobile RFID Security Problem Using Web Service.
Proceedings of the Progress in WWW Research and Development, 2008

2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007

Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007

Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification.
Proceedings of the Computational Science and Its Applications, 2007

Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

Efficient Password-Authenticated Key Exchange Based on RSA.
Proceedings of the Topics in Cryptology, 2007

Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Group key exchange over combined wired and wireless networks.
J. Commun. Networks, 2006

Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Constant Round Group Key Exchange with Logarithmic Computational Complexity.
IACR Cryptol. ePrint Arch., 2006

Towards Trustworthy e-Voting using Paper Receipts.
IACR Cryptol. ePrint Arch., 2006

Security Enhancement of a Remote User Authentication Scheme Using Smart Cards.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

An Efficient Dispute Resolving Method for Digital Images.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Group Key Agreement Protocol Among Mobile Devices in Different Cells.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Security Analysis and Implementation Leveraging Globally Networked RFIDs.
Proceedings of the Personal Wireless Communications, 2006

Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.
Proceedings of the Advances in Hybrid Information Technology, 2006

Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006

XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.
Proceedings of the Computational Science and Its Applications, 2006

An Inter-domain Key Agreement Protocol Using Weak Passwords.
Proceedings of the Computational Science and Its Applications, 2006

Two Efficient and Secure Authentication Schemes Using Smart Cards.
Proceedings of the Computational Science and Its Applications, 2006

A Semantic Context-Aware Access Control in Pervasive Environments.
Proceedings of the Computational Science and Its Applications, 2006

2-Way Text Classification for Harmful Web Documents.
Proceedings of the Computational Science and Its Applications, 2006

Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
Proceedings of the Computational Science and Its Applications, 2006

Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
Proceedings of the Computational Science and Its Applications, 2006

A PKI System for Detecting the Exposure of a User's Secret Key.
Proceedings of the Public Key Infrastructure, 2006

An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI.
Proceedings of the Public Key Infrastructure, 2006

An RFID System Based MCLT System with Improved Privacy.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
The Plan and Tools for Vulnerability Testing in Information Software-Based System.
J. Inf. Process. Syst., 2005

A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.
IEEE Commun. Lett., 2005

Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.
IACR Cryptol. ePrint Arch., 2005

Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Secure Group Communications over Combined Wired and Wireless Networks.
Proceedings of the Trust, 2005

Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV.
Proceedings of the Advances in Multimedia Information Processing, 2005

EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services.
Proceedings of the Web Engineering, 5th International Conference, 2005

Implementation of Streamlining PKI System for Web Services.
Proceedings of the Computational Science and Its Applications, 2005

Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.
Proceedings of the Computational Science and Its Applications, 2005

A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.
Proceedings of the Computational Science and Its Applications, 2005

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.
Proceedings of the Computational Science and Its Applications, 2005

Practical and Provably-Secure Multicasting over High-Delay Networks.
Proceedings of the Computational Science, 2005

XML-Based Digital Signature Accelerator in Open Mobile Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
Proceedings of the Public Key Infrastructure, 2005

A Method for Deciding Quantization Steps in QIM Watermarking Schemes.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

RFID System with Fairness Within the Framework of Security and Privacy.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

XML-Based Security Acceleration Methods Supporting Fast Mobile Grid.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005

XKMS-Based Key Management for Open LBS in Web Services Environment.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

2004
DDH-based Group Key Agreement in a Mobile Environment.
IACR Cryptol. ePrint Arch., 2004

Secure Group Communications over Combined Wired/Wireless Networks.
IACR Cryptol. ePrint Arch., 2004

A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords.
IACR Cryptol. ePrint Arch., 2004

A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme.
IACR Cryptol. ePrint Arch., 2004

Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.
IACR Cryptol. ePrint Arch., 2004

Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange.
IACR Cryptol. ePrint Arch., 2004

Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.
Proceedings of the Applied Parallel Computing, 2004

Threshold Entrusted Undeniable Signature.
Proceedings of the Information Security and Cryptology, 2004

Simple and Efficient Group Key Agreement Based on Factoring.
Proceedings of the Computational Science and Its Applications, 2004

Security Enhanced WTLS Handshake Protocol.
Proceedings of the Computational Science and Its Applications, 2004

Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Security Risk Modeling over Information and Communication Infrastructure.
Proceedings of the International Conference on Security and Management, 2004

2003
An Improvement of VeriSign's Key Roaming Service Protocol.
Proceedings of the Web Engineering, International Conference, 2003

An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity.
Proceedings of the Information Networking, 2003

Security Analysis and Applications of Standard Key Agreement Protocols.
Proceedings of the Computational Science and Its Applications, 2003

On Differential Power Analysis Attack on the Addition Modular 2<sup>N</sup> Operation of Smart Cards.
Proceedings of the International Conference on Security and Management, 2003

2001
Forward-Secure Commercial Key Escrow Systems.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001

Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.
Proceedings of the Information Security and Cryptology, 2001

2000
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors.
Proceedings of the Information Security and Cryptology, 2000

1999
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.
Proceedings of the Information Security and Cryptology, 1999

1998
One-time self-certified public keys, revisited.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1997
Group Signatures for Hierarchical Multigroups.
Proceedings of the Information Security, First International Workshop, 1997

Two efficient RSA multisignature schemes.
Proceedings of the Information and Communication Security, First International Conference, 1997

Proxy signatures, Revisited.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Convertible Group Signatures.
Proceedings of the Advances in Cryptology, 1996


  Loading...