Kwangjo Kim

According to our database1, Kwangjo Kim authored at least 128 papers between 1990 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Constant-round Dynamic Group Key Exchange from RLWE Assumption.
IACR Cryptology ePrint Archive, 2020

2019
Post-Quantum Security of IGE Mode Encryption in Telegram.
IEICE Transactions, 2019

eMotion: An SGX extension for migrating enclaves.
Comput. Secur., 2019

A Survey on Deep Learning Techniques for Privacy-Preserving.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection.
IEEE Trans. Information Forensics and Security, 2018

Blockchain-Based Decentralized Key Management System with Quantum Resistance.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Network Intrusion Detection using Deep Learning - A Feature Learning Approach
Springer, ISBN: 978-981-13-1443-8, 2018

2017
Understanding Web 2.0 service models, applications, reflections, perspectives, and beyond.
PeerJ PrePrints, 2017

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Transactions, 2017

Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm.
IEICE Transactions, 2017

Cryptography: A New Open Access Journal.
Cryptography, 2017

Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning.
Proceedings of the Information Security Applications - 18th International Conference, 2017

TM-Coin: Trustworthy management of TCB measurements in IoT.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Deep learning in intrusion detection perspective: Overview and further challenges.
Proceedings of the International Workshop on Big Data and Information Security, 2017

Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier.
Proceedings of the International Workshop on Big Data and Information Security, 2017

2016
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.
IEEE Trans. Cybernetics, 2016

Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Revocable Decentralized Multi-Authority Functional Encryption.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

An approach to spam comment detection through domain-independent features.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

Another dummy generation technique in location-based services.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

2015
Differentially private client-side data deduplication protocol for cloud storage services.
Security and Communication Networks, 2015

Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015

Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

Efficient and Secure File Deduplication in Cloud Storage.
IEICE Transactions, 2014

Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

2013
A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks.
Telecommunication Systems, 2013

Preventing Abuse of Cookies Stolen by XSS.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Resuscitating privacy-preserving mobile payment with customer in complete control.
Personal and Ubiquitous Computing, 2012

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012

Generic security-amplifying methods of ordinary digital signatures.
Inf. Sci., 2012

Security weakness in the Proof of Storage with Deduplication.
IACR Cryptology ePrint Archive, 2012

Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2012

2011
New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Communication Systems, 2011

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Communications, 2011

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Transactions, 2011

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Transactions, 2011

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies.
IEICE Transactions, 2011

Defending RFID authentication protocols against DoS attacks.
Comput. Commun., 2011

Discrete logarithm based chameleon hashing and signatures without key exposure.
Comput. Electr. Eng., 2011

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Efficient mobile sensor authentication in smart home and WPAN.
IEEE Trans. Consumer Electronics, 2010

Untraceable Mobile Node Authentication in WSN.
Sensors, 2010

Hidden attribute-based signatures without anonymity revocation.
Inf. Sci., 2010

On the Security of RFID Group Scanning Protocols.
IEICE Transactions, 2010

Enhancements of authenticated multiple key exchange protocol based on bilinear pairings.
Comput. Electr. Eng., 2010

Reconsidering Ryu-Takagi RFID authentication protocol.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Efficient sensor node authentication via 3GPP mobile communication networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
The ring authenticated encryption scheme - How to provide a clue wisely.
Inf. Sci., 2009

A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.
IACR Cryptology ePrint Archive, 2009

Security Analysis of A Remote User Authentication Protocol by Liao and Wang.
IACR Cryptology ePrint Archive, 2009

Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction.
IACR Cryptology ePrint Archive, 2009

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptology ePrint Archive, 2009

Identity-Based Chameleon Hash Scheme Without Key Exposure.
IACR Cryptology ePrint Archive, 2009

3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA.
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009

Forward Secure ID-Based Group Key Agreement Protocol with Anonymity.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Open issues in RFID security.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

On minimum cost coverage in wireless sensor networks.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

2008
Secure authenticated group key agreement protocol in the MANET environment.
Inf. Sec. Techn. Report, 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

Attribute-Based Ring Signatures.
IACR Cryptology ePrint Archive, 2008

A secure mutual authentication scheme with key agreement using smart card from bilinear pairings.
Comput. Syst. Sci. Eng., 2008

Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Security Analysis of an ID-Based Key Agreement for Peer Group Communication.
IEICE Transactions, 2007

Practical Threshold Signatures Without Random Oracles.
Proceedings of the Provable Security, 2007

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Proceedings of the Provable Security, 2007

A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.
Proceedings of the Information Security and Cryptology, 2007

Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups.
Proceedings of the Global Communications Conference, 2007

2006
A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Vehicular Technology, 2006

Mobile RFID Applications and Security Challenges.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

A Scalable and Untraceable Authentication Protocol for RFID.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Cryptanalysis of Lee-Hwang-Li's key authentication scheme.
Appl. Math. Comput., 2005

Practical convertible authenticated encryption schemes using self-certified public keys.
Appl. Math. Comput., 2005

Security of a multisignature scheme for specified group of verifiers.
Appl. Math. Comput., 2005

A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

State-based key management scheme for wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Yet Another Forward Secure Signature from Bilinear Pairings.
Proceedings of the Information Security and Cryptology, 2005

2004
Chameleon Hashing without Key Exposure.
IACR Cryptology ePrint Archive, 2004

Highly reliable trust establishment scheme in ad hoc networks.
Comput. Networks, 2004

Efficient Authenticated Key Agreement Protocol for Dynamic Groups.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

New ID-Based Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2004

An enhanced lightweight authentication protocol for access control in wireless LANs.
Proceedings of the 12th IEEE International Conference on Networks, 2004

A secure and privacy enhanced protocol for location-based services in ubiquitous society.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Threshold Password-Based Authentication Using Bilinear Pairings.
Proceedings of the Public Key Infrastructure, 2004

Secure Key Issuing in ID-based Cryptography.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

Limited Verifier Signature from Bilinear Pairings.
Proceedings of the Applied Cryptography and Network Security, 2004

Weak Property of Malleability in NTRUSign.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A New ID-based Group Signature Scheme from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2003

Practical Solution for Location Privacy in Mobile IPv6.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

On the Power of Computational Secret Sharing.
Proceedings of the Progress in Cryptology, 2003

Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
Proceedings of the Information Security and Cryptology, 2003

Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
Proceedings of the Information Security and Cryptology, 2003

ID-Based Distributed "Magic Ink" Signature from Pairings.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Authentication and payment protocol preserving location privacy in mobile IP.
Proceedings of the Global Telecommunications Conference, 2003

An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Proceedings of the Applied Cryptography and Network Security, 2003

Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

Practical Pay TV Schemes.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem.
Journal of Communications and Networks, 2002

Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433).
IACR Cryptology ePrint Archive, 2002

ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings.
IACR Cryptology ePrint Archive, 2002

Cryptanalysis of Two New Signature Schemes.
IACR Cryptology ePrint Archive, 2002

Self-certified Signatures.
Proceedings of the Progress in Cryptology, 2002

Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer.
Proceedings of the Information Security and Cryptology, 2002

Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

ID-Based Blind Signature and Ring Signature from Pairings.
Proceedings of the Advances in Cryptology, 2002

Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
CONUGA: Constrained User-Group Assignment.
J. Netw. Comput. Appl., 2001

Efficient Public Auction with One-Time Registration and Public Verifiability.
Proceedings of the Progress in Cryptology, 2001

An Efficient and Provably Secure Threshold Blind Signature.
Proceedings of the Information Security and Cryptology, 2001

Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.
Proceedings of the Information Security and Cryptology, 2001

Secure Mobile Agent Using Strong Non-designated Proxy Signature.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Tapping Alert Protocol.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation.
Proceedings of the Progress in Cryptology, 2000

Secure Matchmaking Protocol.
Proceedings of the Information Security and Cryptology, 2000

Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
Proceedings of the Information Security and Cryptology, 1999

1997
Improving Bounds for the Number of Correlation Immune Boolean Functions.
Inf. Process. Lett., 1997

Two efficient RSA multisignature schemes.
Proceedings of the Information and Communication Security, First International Conference, 1997

1994
Semi-bent Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1991
Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC.
Proceedings of the Advances in Cryptology, 1991

1990
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1990


  Loading...