Juryon Paik

Orcid: 0000-0002-0564-6412

According to our database1, Juryon Paik authored at least 36 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015

2014
Association Rule Extraction from XML Stream Data for Wireless Sensor Networks.
Sensors, 2014

A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks.
Sensors, 2014

Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014

2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013

An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2013

On the security of a password-only authenticated three-party key exchange protocol.
IACR Cryptol. ePrint Arch., 2013

2012
Scalable Group Key Exchange for Securing Distributed Operating Systems.
J. Inf. Sci. Eng., 2012

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
KSII Trans. Internet Inf. Syst., 2012

2011
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol.
Inf. Sci., 2011

Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

An Improved Protocol for Server-Aided Authenticated Group Key Establishment.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Security Improvement on a Group Key Exchange Protocol for Mobile Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Future Generation Information Technology, 2011

2009
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
J. Inf. Sci. Eng., 2009

An off-line dictionary attack on a simple three-party key exchange protocol.
IEEE Commun. Lett., 2009

Mining association rules in tree structured XML data.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009

2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008

Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method.
Proceedings of the Progress in WWW Research and Development, 2008

2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Framework for Data Structure-Guided Extraction of XML Association Rules.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Extraction of Implicit Context Information in Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006

Extraction of Interesting Financial Information from Heterogeneous XML-Based Data.
Proceedings of the Computational Science, 2006

2005
Ontology based Service Discovery Middleware for Heterogeneous Agent Platforms.
Proceedings of the First Internaltional Workshop on Personalized Context Modeling and Management for UbiComp Applications, 2005

EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

A New Method for Mining Association Rules from a Collection of XML Documents.
Proceedings of the Computational Science and Its Applications, 2005

EFoX: A Scalable Method for Extracting Frequent Subtrees.
Proceedings of the Computational Science, 2005


  Loading...