% csauthors.net - beta - BibTeX bibliography of Seungjoo Kim
@inproceedings{conf/asiacrypt/KimPW96,
title = {Convertible Group Signatures.},
year = {1996},
booktitle = {ASIACRYPT},
author = {{Seungjoo Kim} and {Sungjun Park} and {Dongho Won}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}
}
@inproceedings{conf/icics/KimPW97,
title = {Proxy signatures, Revisited.},
year = {1997},
booktitle = {ICICS},
author = {{Seungjoo Kim} and {Sangjoon Park} and {Dongho Won}},
publisher = {Springer},
booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}
}
@inproceedings{conf/isw/KimPW97,
title = {Group Signatures for Hierarchical Multigroups.},
year = {1997},
booktitle = {ISW},
author = {{Seungjoo Kim} and {Sangjoon Park} and {Dongho Won}},
publisher = {Springer},
booktitle = {Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}
}
@inproceedings{conf/icisc/KimOW98,
title = {One-time self-certified public keys, revisited.},
year = {1998},
booktitle = {ICISC},
author = {{Seungjoo Kim} and {Soohyun Oh} and {Dongho Won}},
publisher = {Korea Institute of Information Security and Cryptology (KIISC)},
booktitle = {The 1st International Conference on Information Security and Cryptology, ICSCI '98, December 18-19, 1998, Seoul, Korea, Proceedings}
}
@inproceedings{conf/isw/JoyeKL99,
title = {Cryptanalysis of Two Group Signature Schemes.},
year = {1999},
booktitle = {ISW},
author = {{Marc Joye} and {Seungjoo Kim} and {Narn-Yih Lee}},
publisher = {Springer},
booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}
}
@inproceedings{conf/isw/KimLMP99,
title = {On the Difficulty of Key Recovery Systems.},
year = {1999},
booktitle = {ISW},
author = {{Seungjoo Kim} and {Insoo Lee} and {Masahiro Mambo} and {Sungjun Park}},
publisher = {Springer},
booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}
}
@inproceedings{conf/indocrypt/LimKYL00,
title = {A Generalized Takagi-Cryptosystem with a modulus of the form prqs.},
year = {2000},
booktitle = {INDOCRYPT},
author = {{Seongan Lim} and {Seungjoo Kim} and {Ikkwon Yie} and {Hongsub Lee}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}
}
@inproceedings{conf/icisc/YenKLM01,
title = {RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.},
year = {2001},
booktitle = {ICISC},
author = {{Sung-Ming Yen} and {Seungjoo Kim} and {Seongan Lim} and {Sang-Jae Moon}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}
}
@inproceedings{conf/icisc/YenKLM01a,
title = {A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.},
year = {2001},
booktitle = {ICISC},
author = {{Sung-Ming Yen} and {Seungjoo Kim} and {Seongan Lim} and {Sang-Jae Moon}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}
}
@inproceedings{conf/ima/KimCJLMWZ01,
title = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).},
year = {2001},
booktitle = {IMACC},
author = {{Seungjoo Kim} and {Jung Hee Cheon} and {Marc Joye} and {Seongan Lim} and {Masahiro Mambo} and {Dongho Won} and {Yuliang Zheng 001}},
publisher = {Springer},
booktitle = {Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}
}
@inproceedings{conf/indocrypt/LimKYK01,
title = {Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.},
year = {2001},
booktitle = {INDOCRYPT},
author = {{Seongan Lim} and {Seungjoo Kim} and {Ikkwon Yie} and {Jaemoon Kim}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}
}
@inproceedings{conf/sacrypt/LimKYKL01,
title = {XTR Extended to GF(p6m).},
year = {2001},
booktitle = {Selected Areas in Cryptography},
author = {{Seongan Lim} and {Seungjoo Kim} and {Ikkwon Yie} and {Jaemoon Kim} and {Hongsub Lee}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}
}
@inproceedings{conf/wetice/KimKKLPW01,
title = {Forward-Secure Commercial Key Escrow Systems.},
year = {2001},
booktitle = {WETICE},
author = {{Jeeyeon Kim} and {Seungjoo Kim} and {Hyunjo Kwon} and {Sungjae Lee} and {Sangjoon Park} and {Dongho Won}},
publisher = {IEEE Computer Society},
booktitle = {10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA}
}
@inproceedings{conf/ctrsa/KimMZ03,
title = {Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption.},
year = {2003},
booktitle = {CT-RSA},
author = {{Seungjoo Kim} and {Masahiro Mambo} and {Yuliang Zheng 001}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}
}
@inproceedings{conf/ctrsa/LeeCK03,
title = {An Analysis of Proxy Signatures: Is a Secure Channel Necessary?},
year = {2003},
booktitle = {CT-RSA},
author = {{Jung-Yeun Lee} and {Jung Hee Cheon} and {Seungjoo Kim}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}
}
@inproceedings{conf/icwe/KimKPKW03,
title = {An Improvement of VeriSign's Key Roaming Service Protocol.},
year = {2003},
booktitle = {ICWE},
author = {{Jeeyeon Kim} and {Hyunjo Kwon} and {Haeryong Park} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings}
}
@inproceedings{conf/indocrypt/YieLKK03,
title = {Prime Numbers of Diffie-Hellman Groups for IKE-MODP.},
year = {2003},
booktitle = {INDOCRYPT},
author = {{Ikkwon Yie} and {Seongan Lim} and {Seungjoo Kim} and {Dongryeol Kim}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}
}
@article{journals/ipl/ChunKLSY03,
title = {Differential and linear cryptanalysis for 2-round SPNs.},
year = {2003},
journal = {Inf. Process. Lett.},
author = {{Kilsoo Chun} and {Seungjoo Kim} and {Sangjin Lee 002} and {Soo Hak Sung} and {Seonhee Yoon}}
}
@article{journals/tc/YenKLM03,
title = {RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.},
year = {2003},
journal = {IEEE Trans. Computers},
author = {{Sung-Ming Yen} and {Seungjoo Kim} and {Seongan Lim} and {Sang-Jae Moon}}
}
@inproceedings{conf/iccsa/KimKKW04,
title = {Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.},
year = {2004},
booktitle = {ICCSA (1)},
author = {{Jeeyeon Kim} and {Seungjoo Kim} and {Jin Kwak} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I}
}
@inproceedings{conf/iccsa/NamCKW04,
title = {Simple and Efficient Group Key Agreement Based on Factoring.},
year = {2004},
booktitle = {ICCSA (1)},
author = {{Junghyun Nam} and {Seokhyang Cho} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I}
}
@inproceedings{conf/icisc/KimW04,
title = {Threshold Entrusted Undeniable Signature.},
year = {2004},
booktitle = {ICISC},
author = {{Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}
}
@article{journals/iacr/NamKKW04,
title = {Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Sungduk Kim} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/iacr/NamKW04,
title = {Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/iacr/NamKW04a,
title = {A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/iacr/NamKW04b,
title = {A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/iacr/NamKYW04,
title = {Secure Group Communications over Combined Wired/Wireless Networks.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Hyungkyu Yang} and {Dongho Won}}
}
@article{journals/iacr/NamLKW04,
title = {DDH-based Group Key Agreement in a Mobile Environment.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Jinwoo Lee} and {Seungjoo Kim} and {Dongho Won}}
}
@inproceedings{conf/awic/ParkKCKW05,
title = {XKMS-Based Key Management for Open LBS in Web Services Environment.},
year = {2005},
booktitle = {AWIC},
author = {{Namje Park} and {Howon Kim 001} and {Kyoil Chung} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, AWIC 2005, Lodz, Poland, June 6-9, 2005, Proceedings}
}
@inproceedings{conf/ecweb/ParkMKKW05,
title = {XML-Based Security Acceleration Methods Supporting Fast Mobile Grid.},
year = {2005},
booktitle = {EC-Web},
author = {{Namje Park} and {Kiyoung Moon} and {Howon Kim 001} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings}
}
@inproceedings{conf/esas/KwakROKW05,
title = {RFID System with Fairness Within the Framework of Security and Privacy.},
year = {2005},
booktitle = {ESAS},
author = {{Jin Kwak} and {Keunwoo Rhee} and {Soohyun Oh} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}
}
@inproceedings{conf/euc/LeeLKWY05,
title = {A Method for Deciding Quantization Steps in QIM Watermarking Schemes.},
year = {2005},
booktitle = {EUC Workshops},
author = {{Yunho Lee} and {Kwang-Woo Lee} and {Seungjoo Kim} and {Dongho Won} and {Hyungkyu Yang}},
publisher = {Springer},
booktitle = {Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}
}
@inproceedings{conf/europki/LeeKKW05,
title = {A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.},
year = {2005},
booktitle = {EuroPKI},
author = {{YoungGyo Lee} and {In-Jung Kim} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}
}
@inproceedings{conf/gcc/ParkMCKW05,
title = {XML-Based Digital Signature Accelerator in Open Mobile Grid Computing.},
year = {2005},
booktitle = {GCC},
author = {{Namje Park} and {Kiyoung Moon} and {Kyoil Chung} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings}
}
@inproceedings{conf/iccS/NamKKWY05,
title = {Practical and Provably-Secure Multicasting over High-Delay Networks.},
year = {2005},
booktitle = {International Conference on Computational Science (2)},
author = {{Junghyun Nam} and {Hyunjue Kim} and {Seungjoo Kim} and {Dongho Won} and {Hyungkyu Yang}},
publisher = {Springer},
booktitle = {Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part II}
}
@inproceedings{conf/iccsa/ChoNKW05,
title = {An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.},
year = {2005},
booktitle = {ICCSA (1)},
author = {{Seokhyang Cho} and {Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I}
}
@inproceedings{conf/iccsa/ParkKKW05,
title = {Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.},
year = {2005},
booktitle = {ICCSA (2)},
author = {{Namje Park} and {Howon Kim 001} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II}
}
@inproceedings{conf/pcm/KimNKW05,
title = {Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV.},
year = {2005},
booktitle = {PCM (2)},
author = {{Hyunjue Kim} and {Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II}
}
@inproceedings{conf/spc/RheeKKW05,
title = {Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.},
year = {2005},
booktitle = {SPC},
author = {{Keunwoo Rhee} and {Jin Kwak} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings}
}
@inproceedings{conf/trustbus/NamKW05,
title = {Secure Group Communications over Combined Wired and Wireless Networks.},
year = {2005},
booktitle = {TrustBus},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}
}
@inproceedings{conf/wisa/NamKW05,
title = {Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.},
year = {2005},
booktitle = {WISA},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}
}
@article{journals/iacr/NamKW05,
title = {Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/icl/NamKW05,
title = {A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.},
year = {2005},
journal = {IEEE Commun. Lett.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@inproceedings{conf/apweb/ParkKKWK06,
title = {WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.},
year = {2006},
booktitle = {APWeb Workshops},
author = {{Namje Park} and {Jin Kwak} and {Seungjoo Kim} and {Dongho Won} and {Howon Kim 001}},
publisher = {Springer},
booktitle = {Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings}
}
@inproceedings{conf/euc/KwakRPKKSW06,
title = {An RFID System Based MCLT System with Improved Privacy.},
year = {2006},
booktitle = {EUC Workshops},
author = {{Jin Kwak} and {Keunwoo Rhee} and {Namje Park} and {Howon Kim 001} and {Seungjoo Kim} and {Kouichi Sakurai} and {Dongho Won}},
publisher = {Springer},
booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}
}
@inproceedings{conf/europki/LeeAKW06,
title = {A PKI System for Detecting the Exposure of a User's Secret Key.},
year = {2006},
booktitle = {EuroPKI},
author = {{YoungGyo Lee} and {Jeonghee Ahn} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}
}
@inproceedings{conf/iccsa/LeeNKW06,
title = {Two Efficient and Secure Authentication Schemes Using Smart Cards.},
year = {2006},
booktitle = {ICCSA (5)},
author = {{Youngsook Lee} and {Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V}
}
@inproceedings{conf/iccsa/ZhengKSLKW06,
title = {Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.},
year = {2006},
booktitle = {ICCSA (2)},
author = {{He Zheng} and {Jin Kwak} and {Kyungho Son} and {Wansuk Lee} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II}
}
@inproceedings{conf/ichit/RheeKYPPYKW06,
title = {Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.},
year = {2006},
booktitle = {ICHIT},
author = {{Keunwoo Rhee} and {Jin Kwak} and {Wan S. Yi} and {Chanho Park} and {Sangjoon Park} and {Hyungkyu Yang} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers}
}
@inproceedings{conf/ifip6-8/ParkKWK06,
title = {Security Analysis and Implementation Leveraging Globally Networked RFIDs.},
year = {2006},
booktitle = {PWC},
author = {{Namje Park} and {Seungjoo Kim} and {Dongho Won} and {Howon Kim 001}},
publisher = {Springer},
booktitle = {Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings}
}
@inproceedings{conf/ispa/KimKCLW06,
title = {Group Key Agreement Protocol Among Mobile Devices in Different Cells.},
year = {2006},
booktitle = {ISPA Workshops},
author = {{Jeeyeon Kim} and {Seungjoo Kim} and {Kilsoo Chun} and {Jaeil Lee} and {Dongho Won}},
publisher = {Springer},
booktitle = {Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings}
}
@inproceedings{conf/kes/ParkKKWK06,
title = {Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.},
year = {2006},
booktitle = {KES (1)},
author = {{Namje Park} and {Jin Kwak} and {Seungjoo Kim} and {Dongho Won} and {Howon Kim 001}},
publisher = {Springer},
booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I}
}
@inproceedings{conf/otm/LeeJKW06,
title = {An Efficient Dispute Resolving Method for Digital Images.},
year = {2006},
booktitle = {OTM Workshops (1)},
author = {{Yunho Lee} and {Heasuk Jo} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I}
}
@article{journals/iacr/LeeLKW06,
title = {Towards Trustworthy e-Voting using Paper Receipts.},
year = {2006},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yunho Lee} and {Kwang-Woo Lee} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/ieicet/LeeKW06,
title = {Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.},
year = {2006},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Yunho Lee} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/ieicet/NamKW06,
title = {Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords.},
year = {2006},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/ieicet/NamKW06a,
title = {Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.},
year = {2006},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}}
}
@inproceedings{conf/atc/ChoiLKKW07,
title = {An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.},
year = {2007},
booktitle = {ATC},
author = {{Donghyun Choi} and {Yunho Lee} and {Hogab Kang} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings}
}
@inproceedings{conf/awic/ParkKW07,
title = {Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.},
year = {2007},
booktitle = {AWIC},
author = {{Namje Park} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25 - 27, 2007}
}
@inproceedings{conf/ctrsa/ParkNKW07,
title = {Efficient Password-Authenticated Key Exchange Based on RSA.},
year = {2007},
booktitle = {CT-RSA},
author = {{Sangjoon Park} and {Junghyun Nam} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}
}
@inproceedings{conf/hci/ShinCLPKW07,
title = {Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.},
year = {2007},
booktitle = {HCI (5)},
author = {{Donghwi Shin} and {Youngsung Choi} and {Yunho Lee} and {Sangjoon Park} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I}
}
@inproceedings{conf/kesamsta/LeeAKW07,
title = {A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.},
year = {2007},
booktitle = {KES-AMSTA},
author = {{YoungGyo Lee} and {Jeonghee Ahn} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}
}
@article{journals/ieicet/NamKPW07,
title = {Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards.},
year = {2007},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Junghyun Nam} and {Seungjoo Kim} and {Sangjoon Park} and {Dongho Won}}
}
@article{journals/isci/NamLKW07,
title = {Security weakness in a three-party pairing-based protocol for password authenticated key exchange.},
year = {2007},
journal = {Inf. Sci.},
author = {{Junghyun Nam} and {Youngsook Lee} and {Seungjoo Kim} and {Dongho Won}}
}
@inproceedings{conf/fgcn/HongJKWP08,
title = {The Vulnerabilities Analysis of Fuzzy Vault Using Password.},
year = {2008},
booktitle = {FGCN (3: BSBT)},
author = {{Sumin Hong} and {Woongryul Jeon} and {Seungjoo Kim} and {Dongho Won} and {Choonsik Park}},
publisher = {IEEE Computer Society},
booktitle = {International Conference on Bio-Science and Bio-Technology, BSBT 2008, part of the Second International Conference on Future Generation Communication and Networking, FGCN 2008, Volume 3, Hainan Island, China, December 13-15, 2008}
}
@inproceedings{conf/icebe/LeeKW08,
title = {How to Trust DRE Voting Machines Preserving Voter Privacy.},
year = {2008},
booktitle = {ICEBE},
author = {{Yunho Lee} and {Seungjoo Kim} and {Dongho Won}},
publisher = {IEEE Computer Society},
booktitle = {2008 IEEE International Conference on e-Business Engineering, ICEBE 2008, Xi'an, China, October 22-24, 2008}
}
@inproceedings{conf/noms/ParkCKW08,
title = {Enforcing security in mobile RFID networks multilateral approaches and solutions.},
year = {2008},
booktitle = {NOMS},
author = {{Namje Park} and {Dooho Choi} and {Seungjoo Kim} and {Dongho Won}},
publisher = {IEEE},
booktitle = {IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil}
}
@inproceedings{conf/siggrapha/PengYJSK08,
title = {Liuliu Pangpang.},
year = {2008},
booktitle = {SIGGRAPH ASIA Art Gallery & Emerging Technologies},
author = {{Yachi Peng} and {Maowei Yu} and {Woo sok Jang} and {Sue Gyeong Syn} and {Seungjoo Kim}},
publisher = {ACM},
booktitle = {International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH ASIA 2008, Singapore, December 10-13, 2008, Art Gallery & Emerging Technologies}
}
@inproceedings{conf/wisa/ChoiCWK08,
title = {Protection Profile for Connected Interoperable DRM Framework.},
year = {2008},
booktitle = {WISA},
author = {{Donghyun Choi} and {Sungkyu Cho} and {Dongho Won} and {Seungjoo Kim}},
publisher = {Springer},
booktitle = {Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}
}
@inproceedings{conf/aina/LeeHWK09,
title = {Cipher Suite Setting Problem of SSL Protocol and it's Solutions.},
year = {2009},
booktitle = {AINA Workshops},
author = {{Yoonyoung Lee} and {Soonhaeng Hur} and {Dongho Won} and {Seungjoo Kim}},
publisher = {IEEE Computer Society},
booktitle = {23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009}
}
@inproceedings{conf/fgit/KimLKW09,
title = {Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme.},
year = {2009},
booktitle = {FGIT-FGCN},
author = {{Mijin Kim} and {Byunghee Lee} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}
}
@inproceedings{conf/iccsa/KimJKW09,
title = {Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.},
year = {2009},
booktitle = {ICCSA (2)},
author = {{Mijin Kim} and {Heasuk Jo} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II}
}
@inproceedings{conf/iccsa/LeeLKW09,
title = {A Practical Approach to a Reliable Electronic Election.},
year = {2009},
booktitle = {ICCSA (2)},
author = {{Kwang-Woo Lee} and {Yunho Lee} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II}
}
@inproceedings{conf/iccsa/YiKW09,
title = {Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.},
year = {2009},
booktitle = {ICCSA (2)},
author = {{Wansuck Yi} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II}
}
@inproceedings{conf/ispec/JoJLKW09,
title = {Security Specification for Conversion Technologies of Heterogeneous DRM Systems.},
year = {2009},
booktitle = {ISPEC},
author = {{Heasuk Jo} and {Woongryul Jeon} and {Yunho Lee} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings}
}
@inproceedings{conf/ncm/JoLKKW09,
title = {Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.},
year = {2009},
booktitle = {NCM},
author = {{Heasuk Jo} and {Yunho Lee} and {Mijin Kim} and {Seungjoo Kim} and {Dongho Won}},
publisher = {IEEE Computer Society},
booktitle = {International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}
}
@inproceedings{conf/bibm/SonLWK10,
title = {U-healthcare system protecting privacy based on cloaker.},
year = {2010},
booktitle = {BIBM Workshops},
author = {{Seungjin Son} and {Kwang-Woo Lee} and {Dongho Won} and {Seungjoo Kim}},
publisher = {IEEE},
booktitle = {2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, BIBMW 2010, Hong Kong, December 18, 2010}
}
@inproceedings{conf/iccsa/JoKW10,
title = {A Study on Comparative Analysis of the Information Security Management Systems.},
year = {2010},
booktitle = {ICCSA (4)},
author = {{Heasuk Jo} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Computational Science and Its Applications - ICCSA 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part IV}
}
@inproceedings{conf/icuimc/LeeCWK10,
title = {Security analysis on commercial online music streaming service and countermeasures.},
year = {2010},
booktitle = {ICUIMC},
author = {{Sangsik Lee} and {Donghyun Choi} and {Dongho Won} and {Seungjoo Kim}},
publisher = {ACM},
booktitle = {Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010}
}
@inproceedings{conf/ispec/HwangJCKWK10,
title = {A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), .},
year = {2010},
booktitle = {ISPEC},
author = {{Yu-na Hwang} and {Hanjae Jeong} and {Sungkyu Cho} and {Songyi Kim} and {Dongho Won} and {Seungjoo Kim}},
publisher = {Springer},
booktitle = {Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings}
}
@inproceedings{conf/ispec/LeeLWK10,
title = {Protection Profile for Secure E-Voting Systems.},
year = {2010},
booktitle = {ISPEC},
author = {{Kwang-Woo Lee} and {Yunho Lee} and {Dongho Won} and {Seungjoo Kim}},
publisher = {Springer},
booktitle = {Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings}
}
@inproceedings{conf/ncm/KimWLKK10,
title = {Automated DCI compliance test system for Digital Cinema Entities.},
year = {2010},
booktitle = {NCM},
author = {{Taehyun Kim} and {Dongho Won} and {Kwang-Woo Lee} and {Hogab Kang} and {Seungjoo Kim}},
publisher = {IEEE Computer Society},
booktitle = {International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advanced Information Management and Service, IDC 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}
}
@inproceedings{conf/securware/RheeLWNK10,
title = {Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks.},
year = {2010},
booktitle = {SECURWARE},
author = {{Keunwoo Rhee} and {Byunghee Lee} and {Dongho Won} and {Hac Yun Na} and {Seungjoo Kim}},
publisher = {IEEE Computer Society},
booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010}
}
@inproceedings{conf/wism/KimKW10,
title = {An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity.},
year = {2010},
booktitle = {WISM},
author = {{Mijin Kim} and {Seungjoo Kim} and {Dongho Won}},
publisher = {Springer},
booktitle = {Web Information Systems and Mining - International Conference, WISM 2010, Sanya, China, October 23-24, 2010. Proceedings}
}
@article{journals/cee/LeeKW10,
title = {Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.},
year = {2010},
journal = {Comput. Electr. Eng.},
author = {{Yunho Lee} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/csi/LeePMKW10,
title = {Towards trustworthy e-voting using paper receipts.},
year = {2010},
journal = {Comput. Stand. Interfaces},
author = {{Yunho Lee} and {Sangjoon Park} and {Masahiro Mambo} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/jise/JeongWK10,
title = {Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.},
year = {2010},
journal = {J. Inf. Sci. Eng.},
author = {{Hanjae Jeong} and {Dongho Won} and {Seungjoo Kim}}
}
@inproceedings{conf/icuimc/KwakLWK11,
title = {Analysis and countermeasures of security vulnerability on portal sites.},
year = {2011},
booktitle = {ICUIMC},
author = {{Kyoungju Kwak} and {Kwang-Woo Lee} and {Dongho Won} and {Seungjoo Kim}},
publisher = {ACM},
booktitle = {Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Republic of Korea, February 21 - 23, 2011}
}
@article{journals/itiis/JoKW11,
title = {Advanced Information Security Management Evaluation System.},
year = {2011},
journal = {KSII Trans. Internet Inf. Syst.},
author = {{Heasuk Jo} and {Seungjoo Kim} and {Dongho Won}}
}
@article{journals/jise/LeeSWK11,
title = {Secure Data Deletion for USB Flash Memory.},
year = {2011},
journal = {J. Inf. Sci. Eng.},
author = {{Byunghee Lee} and {Kyungho Son} and {Dongho Won} and {Seungjoo Kim}}
}
@inproceedings{conf/cube/JoKW12,
title = {Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.},
year = {2012},
booktitle = {CUBE},
author = {{Heasuk Jo} and {Seungjoo Kim} and {Dongho Won}},
publisher = {ACM},
booktitle = {CUBE International IT Conference & Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012}
}
@inproceedings{conf/icuimc/JeongKW12,
title = {On the security of an novel protocol for downloadable CAS.},
year = {2012},
booktitle = {ICUIMC},
author = {{Hanjae Jeong} and {Seungjoo Kim} and {Dongho Won}},
publisher = {ACM},
booktitle = {The 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC '12, Kuala Lumpur, Malaysia, February 20-22, 2012}
}
@article{journals/isci/SeoCHK12,
title = {Efficient certificateless proxy signature scheme with provable security.},
year = {2012},
journal = {Inf. Sci.},
author = {{Seung-Hyun Seo} and {Kyu Young Choi} and {Jung Yeon Hwang} and {Seungjoo Kim}}
}
@inproceedings{conf/ictc/ParkKK13,
title = {A study on weakness and improvement of Cloud Shredder.},
year = {2013},
booktitle = {ICTC},
author = {{Minsu Park} and {Sunghoon Kang} and {Seungjoo Kim}},
publisher = {IEEE},
booktitle = {International Conference on Information and Communication Technology Convergence, ICTC 2013, Jeju Island, South Korea, 4-16 October 2013}
}
@article{journals/jise/ChoiJWK13,
title = {Hybrid Key Management Architecture for Robust SCADA Systems.},
year = {2013},
journal = {J. Inf. Sci. Eng.},
author = {{Donghyun Choi} and {Hanjae Jeong} and {Dongho Won} and {Seungjoo Kim}}
}
@article{journals/jsw/LeeCWK13,
title = {Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea.},
year = {2013},
journal = {J. Softw.},
author = {{Sangsik Lee} and {Donghyun Choi} and {Dongho Won} and {Seungjoo Kim}}
}
@inproceedings{conf/icufn/BaekSK15,
title = {Preserving biosensor users' anonymity over wireless cellular network.},
year = {2015},
booktitle = {ICUFN},
author = {{Seungsoo Baek} and {Seung-Hyun Seo} and {Seungjoo Kim}},
publisher = {IEEE},
booktitle = {Seventh International Conference on Ubiquitous and Future Networks, ICUFN 2015, Sapporo, Japan, July 7-10, 2015}
}
@article{journals/ppna/LeeCLK15,
title = {VoIP-aware network attack detection based on statistics and behavior of SIP traffic.},
year = {2015},
journal = {Peer-to-Peer Netw. Appl.},
author = {{Jonghan Lee} and {Kyumin Cho} and {ChangYong Lee} and {Seungjoo Kim}}
}
@article{journals/ijdsn/BaekSK16,
title = {Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment.},
year = {2016},
journal = {Int. J. Distributed Sens. Networks},
author = {{Seungsoo Baek} and {Seung-Hyun Seo} and {Seungjoo Kim}}
}
@article{journals/tjs/ChoLSK16,
title = {A novel security architecture of electronic vehicle system for smart grid communication.},
year = {2016},
journal = {J. Supercomput.},
author = {{Kyumin Cho} and {Hyunwoo Lim} and {Taeshik Shon} and {Seungjoo Kim}}
}
@article{journals/symmetry/KangK17,
title = {How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability.},
year = {2017},
journal = {Symmetry},
author = {{Sooyoung Kang} and {Seungjoo Kim}}
}
@article{journals/wpc/LeeK17a,
title = {Analysis and Security Evaluation of Security Threat on Broadcasting Service.},
year = {2017},
journal = {Wirel. Pers. Commun.},
author = {{Jong Han Lee} and {Seungjoo Kim}}
}
@article{journals/iacr/LeeK18,
title = {Countering Block Withholding Attack Effciently.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@article{journals/iacr/LeeK18a,
title = {Pooled Mining Makes Selfish Mining Tricky.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@article{journals/scn/ChaBKK18,
title = {Security Evaluation Framework for Military IoT Devices.},
year = {2018},
journal = {Secur. Commun. Networks},
author = {{Sungyong Cha} and {Seungsoo Baek} and {Sooyoung Kang} and {Seungjoo Kim}}
}
@inproceedings{conf/infocom/0001K19,
title = {Countering Block Withholding Attack Efficiently.},
year = {2019},
booktitle = {INFOCOM Workshops},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}},
publisher = {IEEE},
booktitle = {IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2019, Paris, France, April 29 - May 2, 2019}
}
@article{journals/iacr/LeeK19,
title = {Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@inproceedings{conf/mobicom/0001K20,
title = {Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies.},
year = {2020},
booktitle = {CryBlock@MOBICOM},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}},
publisher = {ACM},
booktitle = {CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020}
}
@article{journals/access/ChaBK20,
title = {Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain.},
year = {2020},
journal = {IEEE Access},
author = {{Sungyong Cha} and {Seungsoo Baek} and {Seungjoo Kim}}
}
@article{journals/iacr/LeeK20,
title = {Short Selling Attack: A Self-Destructive But Profitable 51\% Attack On PoS Blockchains.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@inproceedings{conf/aft/0001LK22,
title = {Block Double-Submission Attack: Block Withholding Can Be Self-Destructive.},
year = {2022},
booktitle = {AFT},
author = {{Suhyeon Lee 001} and {Donghwan Lee} and {Seungjoo Kim}},
publisher = {ACM},
booktitle = {Proceedings of the 4th ACM Conference on Advances in Financial Technologies, AFT 2022, Cambridge, MA, USA, September 19-21, 2022}
}
@inproceedings{conf/milcom/LeeCK22,
title = {Do You Really Need to Disguise Normal Servers as Honeypots?},
year = {2022},
booktitle = {MILCOM},
author = {{Suhyeon Lee 001} and {Kwangsoo Cho} and {Seungjoo Kim}},
publisher = {IEEE},
booktitle = {IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022}
}
@article{journals/access/LeeK22,
title = {Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges.},
year = {2022},
journal = {IEEE Access},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@article{journals/jaihc/KangK22,
title = {CIA-level driven secure SDLC framework for integrating security into SDLC process.},
year = {2022},
journal = {J. Ambient Intell. Humaniz. Comput.},
author = {{Sooyoung Kang} and {Seungjoo Kim}}
}
@inproceedings{conf/icisc/AhnKK23,
title = {mdTLS: How to Make Middlebox-Aware TLS More Efficient?},
year = {2023},
booktitle = {ICISC (2)},
author = {{Taehyun Ahn} and {Jiwon Kwak} and {Seungjoo Kim}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II}
}
@article{journals/concurrency/LeeK23,
title = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies.},
year = {2023},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@article{journals/corr/abs-2312-16818,
title = {Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions.},
year = {2023},
journal = {CoRR},
author = {{Yejun Kim} and {Kwangsoo Cho} and {Seungjoo Kim}}
}
@article{journals/ict-express/0001K23,
title = {Rethinking selfish mining under pooled mining.},
year = {2023},
journal = {ICT Express},
author = {{Suhyeon Lee 001} and {Seungjoo Kim}}
}
@article{journals/corr/abs-2401-03675,
title = {A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment.},
year = {2024},
journal = {CoRR},
author = {{Haena Kim} and {Yejun Kim} and {Seungjoo Kim}}
}