Junghyun Nam

Orcid: 0009-0003-6427-2013

According to our database1, Junghyun Nam authored at least 74 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Motion to Dance Music Generation using Latent Diffusion Model.
Proceedings of the SIGGRAPH Asia 2023 Technical Communications, 2023

2021
Understanding of the Quality of Computer-Mediated Communication Technology in the Context of Business Planning.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2021

Determining the motivations to use Computer-Mediated Communication.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2016
Digital Optoelectrical Pulse Method for Vernier-Type Rotary Encoders.
IEEE Trans. Instrum. Meas., 2016

Forward Anonymity-Preserving Secure Remote Authentication Scheme.
KSII Trans. Internet Inf. Syst., 2016

Influence of Information Product Quality on Informing Users: A Web Portal Context.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2016

2015
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015

2014
Association Rule Extraction from XML Stream Data for Wireless Sensor Networks.
Sensors, 2014

A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks.
Sensors, 2014

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014

Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014

Bitmap-based Prefix Caching for Fast IP Lookup.
KSII Trans. Internet Inf. Syst., 2014

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014

Understanding the motivation to use web portals.
Comput. Hum. Behav., 2014

2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013

An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2013

On the security of a password-only authenticated three-party key exchange protocol.
IACR Cryptol. ePrint Arch., 2013

2012
Scalable Group Key Exchange for Securing Distributed Operating Systems.
J. Inf. Sci. Eng., 2012

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
KSII Trans. Internet Inf. Syst., 2012

An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments.
IEICE Trans. Commun., 2012

2011
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol.
Inf. Sci., 2011

Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

An Improved Protocol for Server-Aided Authenticated Group Key Establishment.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Security Improvement on a Group Key Exchange Protocol for Mobile Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of the User Authentication Scheme with Anonymity.
Proceedings of the Future Generation Information Technology, 2011

2010
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2010

2009
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
J. Inf. Sci. Eng., 2009

An off-line dictionary attack on a simple three-party key exchange protocol.
IEEE Commun. Lett., 2009

Web portal quality.
Proceedings of the 2009 IEEE/INFORMS International Conference on Service Operations, 2009

Mining association rules in tree structured XML data.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009

2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008

Infringing and Improving Password Security of a Three-Party Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2008

Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

A New Wafer Level Latent Defect Screening Methodology for Highly Reliable DRAM Using a Response Surface Method.
Proceedings of the 2008 IEEE International Test Conference, 2008

Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method.
Proceedings of the Progress in WWW Research and Development, 2008

2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007

Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007

Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
IACR Cryptol. ePrint Arch., 2007

Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Framework for Data Structure-Guided Extraction of XML Association Rules.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Efficient Password-Authenticated Key Exchange Based on RSA.
Proceedings of the Topics in Cryptology, 2007

Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Group key exchange over combined wired and wireless networks.
J. Commun. Networks, 2006

Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Constant Round Group Key Exchange with Logarithmic Computational Complexity.
IACR Cryptol. ePrint Arch., 2006

Security Enhancement of a Remote User Authentication Scheme Using Smart Cards.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

An Inter-domain Key Agreement Protocol Using Weak Passwords.
Proceedings of the Computational Science and Its Applications, 2006

Two Efficient and Secure Authentication Schemes Using Smart Cards.
Proceedings of the Computational Science and Its Applications, 2006

The News: Examining Perceptions of Information Product Quality (IPQ).
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.
IEEE Commun. Lett., 2005

Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.
IACR Cryptol. ePrint Arch., 2005

Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Secure Group Communications over Combined Wired and Wireless Networks.
Proceedings of the Trust, 2005

Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV.
Proceedings of the Advances in Multimedia Information Processing, 2005

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.
Proceedings of the Computational Science and Its Applications, 2005

Practical and Provably-Secure Multicasting over High-Delay Networks.
Proceedings of the Computational Science, 2005

2004
DDH-based Group Key Agreement in a Mobile Environment.
IACR Cryptol. ePrint Arch., 2004

Secure Group Communications over Combined Wired/Wireless Networks.
IACR Cryptol. ePrint Arch., 2004

A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords.
IACR Cryptol. ePrint Arch., 2004

A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme.
IACR Cryptol. ePrint Arch., 2004

Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.
IACR Cryptol. ePrint Arch., 2004

Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange.
IACR Cryptol. ePrint Arch., 2004

Simple and Efficient Group Key Agreement Based on Factoring.
Proceedings of the Computational Science and Its Applications, 2004

2001
Bitmap approach to trend clustering for prediction in time series databases.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2001


  Loading...