Il-Gon Kim

According to our database1, Il-Gon Kim authored at least 15 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Using a Process Algebraic Approach of Verifying Access Control in XML-based Healthcare Systems.
J. Res. Pract. Inf. Technol., 2014

2007
Static Verification of Access Control Model for AXML Documents.
Proceedings of the Advances in Data and Web Management, 2007

Atomicity for P2P based XML Repositories.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2006
Threat Evaluation Method for Distributed Network Environment.
J. Inf. Sci. Eng., 2006

Formal Verification of Security Model Using SPR Tool.
Comput. Artif. Intell., 2006

Application of Model Checking to AXML System's Security: A Case Study.
Proceedings of the Web Services and Formal Methods, Third International Workshop, 2006

Security and Privacy Analysis of RFID Systems Using Model Checking.
Proceedings of the High Performance Computing and Communications, 2006

Secrecy Analysis of Purchase Transaction in Electronic Purses.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Model Checking of RADIUS Protocol in Wireless Networks.
IEICE Trans. Commun., 2005

Development of Threat Evaluation Tool for Distributed Network Environment.
Comput. Artif. Intell., 2005

Model-Based Analysis of Money Accountability in Electronic Purses.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR.
Proceedings of the Verification and Validation of Enterprise Information Systems, 2004

Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...