Jeong Ok Kwon

According to our database1, Jeong Ok Kwon authored at least 24 papers between 2005 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Strong Binding Encryption Scheme from Lattices for Secret Broadcast.
IEEE Commun. Lett., 2012

2009
Light-Weight Key Exchange with Different Passwords in the Standard Model.
J. Univers. Comput. Sci., 2009

A forward-secure e-mail protocol without certificated public keys.
Inf. Sci., 2009

Stronger Chikazawa-Yamagishi ID-Based Key Distribution.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Analysis of Revocable-iff-Linked Ring Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Searchable Encryption with <i>Keyword-Recoverability</i>.
IEICE Trans. Inf. Syst., 2009

Efficient secret broadcast in the broadcasting networks.
IEEE Commun. Lett., 2009

A remote user authentication scheme without using smart cards.
Comput. Stand. Interfaces, 2009

Constructing PEKS schemes secure against keyword guessing attacks is possible?
Comput. Commun., 2009

2008
Ring Signature with Weak Linkability and Its Applications.
IEEE Trans. Knowl. Data Eng., 2008

Practical Password-Authenticated Three-Party Key Exchange.
KSII Trans. Internet Inf. Syst., 2008

Strong ID-Based Key Distribution.
IEICE Trans. Commun., 2008

Analysis of Some Keyword Search Schemes in Encrypted Data.
IEEE Commun. Lett., 2008

2007
Three-Round Smart Card-Based Key Exchange Scheme.
IEICE Trans. Commun., 2007

On the <i>Strong</i> Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Strong Diffie-Hellman-DSA Key Exchange.
IEEE Commun. Lett., 2007

Efficient verifier-based password-authenticated key exchange in the three-party setting.
Comput. Stand. Interfaces, 2007

2006
Password-Authenticated Multi-Party Key Exchange with Different Passwords.
IACR Cryptol. ePrint Arch., 2006

Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
Proceedings of the Computational Science, 2006

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.
Proceedings of the Communications and Multimedia Security, 2006

A Diffie-Hellman Key Exchange Protocol Without Random Oracles.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme.
Appl. Math. Comput., 2005


  Loading...