Woongryul Jeon

According to our database1, Woongryul Jeon authored at least 16 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014

An enhanced remote user authentication scheme using smart card.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Password-based single-file encryption and secure data deletion for solid-state drive.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
A secure user-friendly authentication scheme with anonymity for wireless communications.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

An Improvement of Secure Remote User Authentication Scheme Using Smart Cards.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments.
IEICE Trans. Commun., 2012

Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

2011
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011

Analysis of Content Filtering Software.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

A Practical Analysis of Smartphone Security.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of the User Authentication Scheme with Anonymity.
Proceedings of the Future Generation Information Technology, 2011

2009
Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
Proceedings of the Information Security Practice and Experience, 2009

2008
The Vulnerabilities Analysis of Fuzzy Vault Using Password.
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008


  Loading...