Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Seungjoo Kim
@article{DBLP:journals/corr/abs-2401-03675, author = {Haena Kim and Yejun Kim and Seungjoo Kim}, title = {A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment}, journal = {CoRR}, volume = {abs/2401.03675}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.03675}, doi = {10.48550/ARXIV.2401.03675}, eprinttype = {arXiv}, eprint = {2401.03675}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-03675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-11171, author = {Hojung Yang and Suhyeon Lee and Seungjoo Kim}, title = {A Tip for {IOTA} Privacy: {IOTA} Light Node Deanonymization via Tip Selection}, journal = {CoRR}, volume = {abs/2403.11171}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.11171}, doi = {10.48550/ARXIV.2403.11171}, eprinttype = {arXiv}, eprint = {2403.11171}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-11171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LeeK23, author = {Suhyeon Lee and Seungjoo Kim}, title = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {16}, year = {2023}, url = {https://doi.org/10.1002/cpe.6585}, doi = {10.1002/CPE.6585}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LeeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/0001K23, author = {Suhyeon Lee and Seungjoo Kim}, title = {Rethinking selfish mining under pooled mining}, journal = {{ICT} Express}, volume = {9}, number = {3}, pages = {356--361}, year = {2023}, url = {https://doi.org/10.1016/j.icte.2022.03.003}, doi = {10.1016/J.ICTE.2022.03.003}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ict-express/0001K23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AhnKK23, author = {Taehyun Ahn and Jiwon Kwak and Seungjoo Kim}, editor = {Hwajeong Seo and Suhri Kim}, title = {mdTLS: How to Make Middlebox-Aware {TLS} More Efficient?}, booktitle = {Information Security and Cryptology - {ICISC} 2023 - 26th International Conference on Information Security and Cryptology, {ICISC} 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14562}, pages = {39--59}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1238-0\_3}, doi = {10.1007/978-981-97-1238-0\_3}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AhnKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-03573, author = {Taehyun Ahn and Jiwon Kwak and Seungjoo Kim}, title = {mdTLS: How to Make middlebox-aware {TLS} more efficient?}, journal = {CoRR}, volume = {abs/2306.03573}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.03573}, doi = {10.48550/ARXIV.2306.03573}, eprinttype = {arXiv}, eprint = {2306.03573}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-03573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-16818, author = {Yejun Kim and Kwangsoo Cho and Seungjoo Kim}, title = {Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions}, journal = {CoRR}, volume = {abs/2312.16818}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.16818}, doi = {10.48550/ARXIV.2312.16818}, eprinttype = {arXiv}, eprint = {2312.16818}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-16818.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeeK22, author = {Suhyeon Lee and Seungjoo Kim}, title = {Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges}, journal = {{IEEE} Access}, volume = {10}, pages = {2602--2618}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3136328}, doi = {10.1109/ACCESS.2021.3136328}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LeeK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KangK22, author = {Sooyoung Kang and Seungjoo Kim}, title = {CIA-level driven secure {SDLC} framework for integrating security into {SDLC} process}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {10}, pages = {4601--4624}, year = {2022}, url = {https://doi.org/10.1007/s12652-021-03450-z}, doi = {10.1007/S12652-021-03450-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/KangK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/0001LK22, author = {Suhyeon Lee and Donghwan Lee and Seungjoo Kim}, editor = {Maurice Herlihy and Neha Narula}, title = {Block Double-Submission Attack: Block Withholding Can Be Self-Destructive}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {232--243}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559787}, doi = {10.1145/3558535.3559787}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/0001LK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LeeCK22, author = {Suhyeon Lee and Kwangsoo Cho and Seungjoo Kim}, title = {Do You Really Need to Disguise Normal Servers as Honeypots?}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville, MD, USA, November 28 - December 2, 2022}, pages = {166--172}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MILCOM55135.2022.10017586}, doi = {10.1109/MILCOM55135.2022.10017586}, timestamp = {Wed, 08 Feb 2023 17:46:14 +0100}, biburl = {https://dblp.org/rec/conf/milcom/LeeCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05425, author = {Suhyeon Lee and Donghwan Lee and Seungjoo Kim}, title = {Block Double-Submission Attack: Block Withholding Can Be Self-Destructive}, journal = {CoRR}, volume = {abs/2208.05425}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05425}, doi = {10.48550/ARXIV.2208.05425}, eprinttype = {arXiv}, eprint = {2208.05425}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05425.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-17399, author = {Suhyeon Lee and Kwangsoo Cho and Seungjoo Kim}, title = {Do You Really Need to Disguise Normal Servers as Honeypots?}, journal = {CoRR}, volume = {abs/2210.17399}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.17399}, doi = {10.48550/ARXIV.2210.17399}, eprinttype = {arXiv}, eprint = {2210.17399}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-17399.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChaBK20, author = {Sungyong Cha and Seungsoo Baek and Seungjoo Kim}, title = {Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain}, journal = {{IEEE} Access}, volume = {8}, pages = {154269--154280}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3017871}, doi = {10.1109/ACCESS.2020.3017871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChaBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/0001K20, author = {Suhyeon Lee and Seungjoo Kim}, title = {Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies}, booktitle = {CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020}, pages = {7--11}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3410699.3413791}, doi = {10.1145/3410699.3413791}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/0001K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeK20, author = {Suhyeon Lee and Seungjoo Kim}, title = {Short Selling Attack: {A} Self-Destructive But Profitable 51{\%} Attack On PoS Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2020}, url = {https://eprint.iacr.org/2020/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0001K19, author = {Suhyeon Lee and Seungjoo Kim}, title = {Countering Block Withholding Attack Efficiently}, booktitle = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May 2, 2019}, pages = {330--335}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFCOMW.2019.8845116}, doi = {10.1109/INFCOMW.2019.8845116}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/0001K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeK19, author = {Suhyeon Lee and Seungjoo Kim}, title = {Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2019}, url = {https://eprint.iacr.org/2019/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChaBKK18, author = {Sungyong Cha and Seungsoo Baek and Sooyoung Kang and Seungjoo Kim}, title = {Security Evaluation Framework for Military IoT Devices}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {6135845:1--6135845:12}, year = {2018}, url = {https://doi.org/10.1155/2018/6135845}, doi = {10.1155/2018/6135845}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChaBKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018asia, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494}, doi = {10.1145/3196494}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeK18, author = {Suhyeon Lee and Seungjoo Kim}, title = {Countering Block Withholding Attack Effciently}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1211}, year = {2018}, url = {https://eprint.iacr.org/2018/1211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeK18a, author = {Suhyeon Lee and Seungjoo Kim}, title = {Pooled Mining Makes Selfish Mining Tricky}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1230}, year = {2018}, url = {https://eprint.iacr.org/2018/1230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeK18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/KangK17, author = {Sooyoung Kang and Seungjoo Kim}, title = {How to Obtain Common Criteria Certification of Smart {TV} for Home IoT Security and Reliability}, journal = {Symmetry}, volume = {9}, number = {10}, pages = {233}, year = {2017}, url = {https://doi.org/10.3390/sym9100233}, doi = {10.3390/SYM9100233}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/KangK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LeeK17a, author = {Jong Han Lee and Seungjoo Kim}, title = {Analysis and Security Evaluation of Security Threat on Broadcasting Service}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {4}, pages = {4149--4169}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4056-z}, doi = {10.1007/S11277-017-4056-Z}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LeeK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BaekSK16, author = {Seungsoo Baek and Seung{-}Hyun Seo and Seungjoo Kim}, title = {Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {9}, pages = {2171642}, year = {2016}, url = {https://doi.org/10.1177/155014772171642}, doi = {10.1177/155014772171642}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BaekSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChoLSK16, author = {Kyumin Cho and Hyunwoo Lim and Taeshik Shon and Seungjoo Kim}, title = {A novel security architecture of electronic vehicle system for smart grid communication}, journal = {J. Supercomput.}, volume = {72}, number = {1}, pages = {214--231}, year = {2016}, url = {https://doi.org/10.1007/s11227-015-1552-3}, doi = {10.1007/S11227-015-1552-3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChoLSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LeeCLK15, author = {Jonghan Lee and Kyumin Cho and ChangYong Lee and Seungjoo Kim}, title = {VoIP-aware network attack detection based on statistics and behavior of {SIP} traffic}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {5}, pages = {872--880}, year = {2015}, url = {https://doi.org/10.1007/s12083-014-0289-8}, doi = {10.1007/S12083-014-0289-8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LeeCLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/BaekSK15, author = {Seungsoo Baek and Seung{-}Hyun Seo and Seungjoo Kim}, title = {Preserving biosensor users' anonymity over wireless cellular network}, booktitle = {Seventh International Conference on Ubiquitous and Future Networks, {ICUFN} 2015, Sapporo, Japan, July 7-10, 2015}, pages = {470--475}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICUFN.2015.7182588}, doi = {10.1109/ICUFN.2015.7182588}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icufn/BaekSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChoiJWK13, author = {Donghyun Choi and Hanjae Jeong and Dongho Won and Seungjoo Kim}, title = {Hybrid Key Management Architecture for Robust {SCADA} Systems}, journal = {J. Inf. Sci. Eng.}, volume = {29}, number = {2}, pages = {281--298}, year = {2013}, url = {http://www.iis.sinica.edu.tw/page/jise/2013/201303\_06.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChoiJWK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LeeCWK13, author = {Sangsik Lee and Donghyun Choi and Dongho Won and Seungjoo Kim}, title = {Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea}, journal = {J. Softw.}, volume = {8}, number = {3}, pages = {520--527}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.3.520-527}, doi = {10.4304/JSW.8.3.520-527}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LeeCWK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/ParkKK13, author = {Minsu Park and Sunghoon Kang and Seungjoo Kim}, title = {A study on weakness and improvement of Cloud Shredder}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2013, Jeju Island, South Korea, 4-16 October 2013}, pages = {1107--1113}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICTC.2013.6675569}, doi = {10.1109/ICTC.2013.6675569}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/ParkKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SeoCHK12, author = {Seung{-}Hyun Seo and Kyu Young Choi and Jung Yeon Hwang and Seungjoo Kim}, title = {Efficient certificateless proxy signature scheme with provable security}, journal = {Inf. Sci.}, volume = {188}, pages = {322--337}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2011.11.005}, doi = {10.1016/J.INS.2011.11.005}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SeoCHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cube/JoKW12, author = {Heasuk Jo and Seungjoo Kim and Dongho Won}, editor = {Vidyasagar M. Potdar and Debajyoti Mukhopadhyay}, title = {Weakness and simple improvement of anonymous mutual authentication protocol with link-layer}, booktitle = {{CUBE} International {IT} Conference {\&} Exhibition, {CUBE} '12, Pune, India - September 03 - 06, 2012}, pages = {816--819}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381716.2381870}, doi = {10.1145/2381716.2381870}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cube/JoKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/JeongKW12, author = {Hanjae Jeong and Seungjoo Kim and Dongho Won}, editor = {Suk{-}Han Lee and Lajos Hanzo and Roslan Ismail and Dongsoo S. Kim and Min Young Chung and Sang{-}Won Lee}, title = {On the security of an novel protocol for downloadable {CAS}}, booktitle = {The 6th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} '12, Kuala Lumpur, Malaysia, February 20-22, 2012}, pages = {65:1--65:5}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2184751.2184831}, doi = {10.1145/2184751.2184831}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/JeongKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JoKW11, author = {Heasuk Jo and Seungjoo Kim and Dongho Won}, title = {Advanced Information Security Management Evaluation System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {5}, number = {6}, pages = {1192--1213}, year = {2011}, url = {https://doi.org/10.3837/tiis.2011.06.006}, doi = {10.3837/TIIS.2011.06.006}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/JoKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LeeSWK11, author = {Byunghee Lee and Kyungho Son and Dongho Won and Seungjoo Kim}, title = {Secure Data Deletion for {USB} Flash Memory}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {3}, pages = {933--952}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201105\_08.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LeeSWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/KwakLWK11, author = {Kyoungju Kwak and Kwang{-}Woo Lee and Dongho Won and Seungjoo Kim}, editor = {Suk{-}Han Lee and Lajos Hanzo and Min Young Chung and Sang{-}Won Lee and Kwangsu Cho}, title = {Analysis and countermeasures of security vulnerability on portal sites}, booktitle = {Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea, February 21 - 23, 2011}, pages = {98}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1968613.1968728}, doi = {10.1145/1968613.1968728}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/KwakLWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LeeKW10, author = {Yunho Lee and Seungjoo Kim and Dongho Won}, title = {Enhancement of two-factor authenticated key exchange protocols in public wireless LANs}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {213--223}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.08.007}, doi = {10.1016/J.COMPELECENG.2009.08.007}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LeeKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeePMKW10, author = {Yunho Lee and Sangjoon Park and Masahiro Mambo and Seungjoo Kim and Dongho Won}, title = {Towards trustworthy e-voting using paper receipts}, journal = {Comput. Stand. Interfaces}, volume = {32}, number = {5-6}, pages = {305--311}, year = {2010}, url = {https://doi.org/10.1016/j.csi.2010.03.001}, doi = {10.1016/J.CSI.2010.03.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LeePMKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/JeongWK10, author = {Hanjae Jeong and Dongho Won and Seungjoo Kim}, title = {Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {5}, pages = {1845--1858}, year = {2010}, url = {http://www.iis.sinica.edu.tw/page/jise/2010/201009\_18.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/JeongWK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/SonLWK10, author = {Seungjin Son and Kwang{-}Woo Lee and Dongho Won and Seungjoo Kim}, title = {U-healthcare system protecting privacy based on cloaker}, booktitle = {2010 {IEEE} International Conference on Bioinformatics and Biomedicine Workshops, {BIBMW} 2010, Hong Kong, December 18, 2010}, pages = {417--423}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BIBMW.2010.5703838}, doi = {10.1109/BIBMW.2010.5703838}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bibm/SonLWK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/JoKW10, author = {Heasuk Jo and Seungjoo Kim and Dongho Won}, editor = {David Taniar and Osvaldo Gervasi and Beniamino Murgante and Eric Pardede and Bernady O. Apduhan}, title = {A Study on Comparative Analysis of the Information Security Management Systems}, booktitle = {Computational Science and Its Applications - {ICCSA} 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {6019}, pages = {510--519}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12189-0\_44}, doi = {10.1007/978-3-642-12189-0\_44}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/JoKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/LeeCWK10, author = {Sangsik Lee and Donghyun Choi and Dongho Won and Seungjoo Kim}, editor = {Kwan{-}Ho You and Sang{-}Won Lee and Won Kim and Dongho Won}, title = {Security analysis on commercial online music streaming service and countermeasures}, booktitle = {Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2010, Suwon, Republic of Korea, January 14-15, 2010}, pages = {59}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/2108616.2108688}, doi = {10.1145/2108616.2108688}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/LeeCWK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HwangJCKWK10, author = {Yu{-}na Hwang and Hanjae Jeong and Sungkyu Cho and Songyi Kim and Dongho Won and Seungjoo Kim}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {A Proposal of Appropriate Evaluation Scheme for Exchangeable {CAS} (XCAS),}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {217--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_16}, doi = {10.1007/978-3-642-12827-1\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HwangJCKWK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LeeLWK10, author = {Kwang{-}Woo Lee and Yunho Lee and Dongho Won and Seungjoo Kim}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Protection Profile for Secure E-Voting Systems}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {386--397}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_28}, doi = {10.1007/978-3-642-12827-1\_28}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LeeLWK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/KimWLKK10, author = {Taehyun Kim and Dongho Won and Kwang{-}Woo Lee and Hogab Kang and Seungjoo Kim}, title = {Automated {DCI} compliance test system for Digital Cinema Entities}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2010, Sixth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2010: International Conference on Networked Computing, {IMS} 2010: International Conference on Advanced Information Management and Service, {IDC} 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}, pages = {434--439}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5572073/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/KimWLKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/RheeLWNK10, author = {Keunwoo Rhee and Byunghee Lee and Dongho Won and Hac Yun Na and Seungjoo Kim}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.8}, doi = {10.1109/SECURWARE.2010.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/RheeLWNK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/KimKW10, author = {Mijin Kim and Seungjoo Kim and Dongho Won}, editor = {Fu Lee Wang and Zhiguo Gong and Xiangfeng Luo and Jingsheng Lei}, title = {An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity}, booktitle = {Web Information Systems and Mining - International Conference, {WISM} 2010, Sanya, China, October 23-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6318}, pages = {244--253}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16515-3\_31}, doi = {10.1007/978-3-642-16515-3\_31}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wism/KimKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LeeHWK09, author = {Yoonyoung Lee and Soonhaeng Hur and Dongho Won and Seungjoo Kim}, title = {Cipher Suite Setting Problem of {SSL} Protocol and it's Solutions}, booktitle = {23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009}, pages = {140--146}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WAINA.2009.76}, doi = {10.1109/WAINA.2009.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LeeHWK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KimLKW09, author = {Mijin Kim and Byunghee Lee and Seungjoo Kim and Dongho Won}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Alan Chin{-}Chen Chang and Thanos Vasilakos and Mingchu Li and Kouichi Sakurai}, title = {Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme}, booktitle = {Communication and Networking - International Conference, {FGCN/ACN} 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {56}, pages = {421--430}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10844-0\_49}, doi = {10.1007/978-3-642-10844-0\_49}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KimLKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/YiKW09, author = {Wansuck Yi and Seungjoo Kim and Dongho Won}, editor = {Osvaldo Gervasi and David Taniar and Beniamino Murgante and Antonio Lagan{\`{a}} and Youngsong Mun and Marina L. Gavrilova}, title = {Smart Card Based {AKE} Protocol Using Biometric Information in Pervasive Computing Environments}, booktitle = {Computational Science and Its Applications - {ICCSA} 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5593}, pages = {182--190}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02457-3\_16}, doi = {10.1007/978-3-642-02457-3\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/YiKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LeeLKW09, author = {Kwang{-}Woo Lee and Yunho Lee and Seungjoo Kim and Dongho Won}, editor = {Osvaldo Gervasi and David Taniar and Beniamino Murgante and Antonio Lagan{\`{a}} and Youngsong Mun and Marina L. Gavrilova}, title = {A Practical Approach to a Reliable Electronic Election}, booktitle = {Computational Science and Its Applications - {ICCSA} 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5593}, pages = {191--203}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02457-3\_17}, doi = {10.1007/978-3-642-02457-3\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LeeLKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimJKW09, author = {Mijin Kim and Heasuk Jo and Seungjoo Kim and Dongho Won}, editor = {Osvaldo Gervasi and David Taniar and Beniamino Murgante and Antonio Lagan{\`{a}} and Youngsong Mun and Marina L. Gavrilova}, title = {Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key}, booktitle = {Computational Science and Its Applications - {ICCSA} 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5593}, pages = {204--211}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02457-3\_18}, doi = {10.1007/978-3-642-02457-3\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimJKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JoJLKW09, author = {Heasuk Jo and Woongryul Jeon and Yunho Lee and Seungjoo Kim and Dongho Won}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Security Specification for Conversion Technologies of Heterogeneous {DRM} Systems}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {159--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_15}, doi = {10.1007/978-3-642-00843-6\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JoJLKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/JoLKKW09, author = {Heasuk Jo and Yunho Lee and Mijin Kim and Seungjoo Kim and Dongho Won}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {618--621}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.251}, doi = {10.1109/NCM.2009.251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/JoLKKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/HongJKWP08, author = {Sumin Hong and Woongryul Jeon and Seungjoo Kim and Dongho Won and Choonsik Park}, title = {The Vulnerabilities Analysis of Fuzzy Vault Using Password}, booktitle = {International Conference on Bio-Science and Bio-Technology, {BSBT} 2008, part of the Second International Conference on Future Generation Communication and Networking, {FGCN} 2008, Volume 3, Hainan Island, China, December 13-15, 2008}, pages = {76--83}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FGCN.2008.211}, doi = {10.1109/FGCN.2008.211}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/HongJKWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/LeeKW08, author = {Yunho Lee and Seungjoo Kim and Dongho Won}, title = {How to Trust {DRE} Voting Machines Preserving Voter Privacy}, booktitle = {2008 {IEEE} International Conference on e-Business Engineering, {ICEBE} 2008, Xi'an, China, October 22-24, 2008}, pages = {302--307}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICEBE.2008.37}, doi = {10.1109/ICEBE.2008.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/LeeKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ParkCKW08, author = {Namje Park and Dooho Choi and Seungjoo Kim and Dongho Won}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Enforcing security in mobile {RFID} networks multilateral approaches and solutions}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {999--1002}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575267}, doi = {10.1109/NOMS.2008.4575267}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/ParkCKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggrapha/PengYJSK08, author = {Yachi Peng and Maowei Yu and Woo sok Jang and Sue Gyeong Syn and Seungjoo Kim}, editor = {Tomoe Moriyama and Stephanie Choo}, title = {Liuliu Pangpang}, booktitle = {International Conference on Computer Graphics and Interactive Techniques, {SIGGRAPH} {ASIA} 2008, Singapore, December 10-13, 2008, Art Gallery {\&} Emerging Technologies}, pages = {23}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1504229.1504244}, doi = {10.1145/1504229.1504244}, timestamp = {Wed, 07 Apr 2021 12:19:35 +0200}, biburl = {https://dblp.org/rec/conf/siggrapha/PengYJSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiCWK08, author = {Donghyun Choi and Sungkyu Cho and Dongho Won and Seungjoo Kim}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Protection Profile for Connected Interoperable {DRM} Framework}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {320--332}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_24}, doi = {10.1007/978-3-642-00306-6\_24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiCWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NamKPW07, author = {Junghyun Nam and Seungjoo Kim and Sangjoon Park and Dongho Won}, title = {Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {299--302}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.299}, doi = {10.1093/IETFEC/E90-A.1.299}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NamKPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/NamLKW07, author = {Junghyun Nam and Youngsook Lee and Seungjoo Kim and Dongho Won}, title = {Security weakness in a three-party pairing-based protocol for password authenticated key exchange}, journal = {Inf. Sci.}, volume = {177}, number = {6}, pages = {1364--1375}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2006.09.001}, doi = {10.1016/J.INS.2006.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/NamLKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/ChoiLKKW07, author = {Donghyun Choi and Yunho Lee and Hogab Kang and Seungjoo Kim and Dongho Won}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {An Efficient and Secure Rights Sharing Method for {DRM} System Against Replay Attack}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {135--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_16}, doi = {10.1007/978-3-540-73547-2\_16}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/ChoiLKKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awic/ParkKW07, author = {Namje Park and Seungjoo Kim and Dongho Won}, editor = {Katarzyna Wegrzyn{-}Wolska and Piotr S. Szczepaniak}, title = {Privacy Preserving Enhanced Service Mechanism in Mobile {RFID} Network}, booktitle = {Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - {AWIC} 2007, Fontainebleau, France, June 25 - 27, 2007}, series = {Advances in Soft Computing}, volume = {43}, pages = {278--283}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72575-6\_45}, doi = {10.1007/978-3-540-72575-6\_45}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/awic/ParkKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ParkNKW07, author = {Sangjoon Park and Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {Masayuki Abe}, title = {Efficient Password-Authenticated Key Exchange Based on {RSA}}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {309--323}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_20}, doi = {10.1007/11967668\_20}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ParkNKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ShinCLPKW07, author = {Donghwi Shin and Youngsung Choi and Yunho Lee and Sangjoon Park and Seungjoo Kim and Dongho Won}, editor = {Constantine Stephanidis}, title = {Security Analysis on the Authentication Mechanisms of Korean Popular Messengers}, booktitle = {Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, {UAHCI} 2007, Held as Part of {HCI} International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4554}, pages = {547--552}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73279-2\_61}, doi = {10.1007/978-3-540-73279-2\_61}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/ShinCLPKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/LeeAKW07, author = {YoungGyo Lee and Jeonghee Ahn and Seungjoo Kim and Dongho Won}, editor = {Ngoc Thanh Nguyen and Adam Grzech and Robert J. Howlett and Lakhmi C. Jain}, title = {A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, First {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4496}, pages = {1007--1016}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72830-6\_107}, doi = {10.1007/978-3-540-72830-6\_107}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/LeeAKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NamKW06, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {209--212}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.209}, doi = {10.1093/IETFEC/E89-A.1.209}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NamKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NamKW06a, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {213--218}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.213}, doi = {10.1093/IETFEC/E89-A.1.213}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NamKW06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeKW06, author = {Yunho Lee and Seungjoo Kim and Dongho Won}, title = {Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {7}, pages = {2084--2087}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.7.2084}, doi = {10.1093/IETFEC/E89-A.7.2084}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/ParkKKWK06, author = {Namje Park and Jin Kwak and Seungjoo Kim and Dongho Won and Howon Kim}, editor = {Heng Tao Shen and Jinbao Li and Minglu Li and Jun Ni and Wei Wang}, title = {{WIPI} Mobile Platform with Secure Service for Mobile {RFID} Network Environment}, booktitle = {Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3842}, pages = {741--748}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11610496\_100}, doi = {10.1007/11610496\_100}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apweb/ParkKKWK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/KwakRPKKSW06, author = {Jin Kwak and Keunwoo Rhee and Namje Park and Howon Kim and Seungjoo Kim and Kouichi Sakurai and Dongho Won}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {An {RFID} System Based {MCLT} System with Improved Privacy}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {579--590}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_59}, doi = {10.1007/11807964\_59}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/KwakRPKKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LeeAKW06, author = {YoungGyo Lee and Jeonghee Ahn and Seungjoo Kim and Dongho Won}, editor = {Andrea S. Atzeni and Antonio Lioy}, title = {A {PKI} System for Detecting the Exposure of a User's Secret Key}, booktitle = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4043}, pages = {248--250}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774716\_20}, doi = {10.1007/11774716\_20}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/LeeAKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LeeNKW06, author = {Youngsook Lee and Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Two Efficient and Secure Authentication Schemes Using Smart Cards}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {3984}, pages = {858--866}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751649\_94}, doi = {10.1007/11751649\_94}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LeeNKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ZhengKSLKW06, author = {He Zheng and Jin Kwak and Kyungho Son and Wansuk Lee and Seungjoo Kim and Dongho Won}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3981}, pages = {954--963}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751588\_99}, doi = {10.1007/11751588\_99}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ZhengKSLKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/RheeKYPPYKW06, author = {Keunwoo Rhee and Jin Kwak and Wan S. Yi and Chanho Park and Sangjoon Park and Hyungkyu Yang and Seungjoo Kim and Dongho Won}, editor = {Marcin S. Szczuka and Daniel Howard and Dominik Slezak and Haeng{-}Kon Kim and Tai{-}Hoon Kim and Il Seok Ko and Geuk Lee and Peter M. A. Sloot}, title = {Efficient {RFID} Authentication Protocol for Minimizing {RFID} Tag Computation}, booktitle = {Advances in Hybrid Information Technology, First International Conference, {ICHIT} 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4413}, pages = {607--616}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77368-9\_59}, doi = {10.1007/978-3-540-77368-9\_59}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ichit/RheeKYPPYKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-8/ParkKWK06, author = {Namje Park and Seungjoo Kim and Dongho Won and Howon Kim}, editor = {Pedro Cuenca and Luis Orozco{-}Barbosa}, title = {Security Analysis and Implementation Leveraging Globally Networked RFIDs}, booktitle = {Personal Wireless Communications, {IFIP} {TC6} 11th International Conference, {PWC} 2006, Albacete, Spain, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4217}, pages = {494--505}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11872153\_43}, doi = {10.1007/11872153\_43}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip6-8/ParkKWK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/KimKCLW06, author = {Jeeyeon Kim and Seungjoo Kim and Kilsoo Chun and Jaeil Lee and Dongho Won}, editor = {Geyong Min and Beniamino Di Martino and Laurence Tianruo Yang and Minyi Guo and Gudula R{\"{u}}nger}, title = {Group Key Agreement Protocol Among Mobile Devices in Different Cells}, booktitle = {Frontiers of High Performance Computing and Networking - {ISPA} 2006 Workshops, {ISPA} 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4331}, pages = {1090--1097}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11942634\_112}, doi = {10.1007/11942634\_112}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/KimKCLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/ParkKKWK06, author = {Namje Park and Jin Kwak and Seungjoo Kim and Dongho Won and Howon Kim}, editor = {Bogdan Gabrys and Robert J. Howlett and Lakhmi C. Jain}, title = {Security Techniques Based on {EPC} Gen2 Tag for Secure Mobile {RFID} Network Services}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, {KES} 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4251}, pages = {924--934}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11892960\_111}, doi = {10.1007/11892960\_111}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kes/ParkKKWK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LeeJKW06, author = {Yunho Lee and Heasuk Jo and Seungjoo Kim and Dongho Won}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {An Efficient Dispute Resolving Method for Digital Images}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {331--341}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_57}, doi = {10.1007/11915034\_57}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/LeeJKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2005, editor = {Dongho Won and Seungjoo Kim}, title = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734727}, doi = {10.1007/11734727}, isbn = {3-540-33354-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLKW06, author = {Yunho Lee and Kwang{-}Woo Lee and Seungjoo Kim and Dongho Won}, title = {Towards Trustworthy e-Voting using Paper Receipts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2006}, url = {http://eprint.iacr.org/2006/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/NamKW05, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices}, journal = {{IEEE} Commun. Lett.}, volume = {9}, number = {5}, pages = {429--431}, year = {2005}, url = {https://doi.org/10.1109/LCOMM.2005.1431161}, doi = {10.1109/LCOMM.2005.1431161}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/NamKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/NamLKW05, author = {Junghyun Nam and Jinwoo Lee and Seungjoo Kim and Dongho Won}, title = {DDH-based group key agreement in a mobile environment}, journal = {J. Syst. Softw.}, volume = {78}, number = {1}, pages = {73--83}, year = {2005}, url = {https://doi.org/10.1016/j.jss.2004.10.024}, doi = {10.1016/J.JSS.2004.10.024}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/NamLKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awic/ParkKCKW05, author = {Namje Park and Howon Kim and Kyoil Chung and Seungjoo Kim and Dongho Won}, editor = {Piotr S. Szczepaniak and Janusz Kacprzyk and Adam Niewiadomski}, title = {XKMS-Based Key Management for Open {LBS} in Web Services Environment}, booktitle = {Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, {AWIC} 2005, Lodz, Poland, June 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3528}, pages = {367--373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11495772\_57}, doi = {10.1007/11495772\_57}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/awic/ParkKCKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/ParkMKKW05, author = {Namje Park and Kiyoung Moon and Howon Kim and Seungjoo Kim and Dongho Won}, editor = {Kurt Bauknecht and Birgit Pr{\"{o}}ll and Hannes Werthner}, title = {XML-Based Security Acceleration Methods Supporting Fast Mobile Grid}, booktitle = {E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3590}, pages = {316--326}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545163\_32}, doi = {10.1007/11545163\_32}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/ParkMKKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KwakROKW05, author = {Jin Kwak and Keunwoo Rhee and Soohyun Oh and Seungjoo Kim and Dongho Won}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {{RFID} System with Fairness Within the Framework of Security and Privacy}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {142--152}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_12}, doi = {10.1007/11601494\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KwakROKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LeeLKWY05, author = {Yunho Lee and Kwang{-}Woo Lee and Seungjoo Kim and Dongho Won and Hyungkyu Yang}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {A Method for Deciding Quantization Steps in {QIM} Watermarking Schemes}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {965--975}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_99}, doi = {10.1007/11596042\_99}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/LeeLKWY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LeeKKW05, author = {YoungGyo Lee and In{-}Jung Kim and Seungjoo Kim and Dongho Won}, editor = {David W. Chadwick and Gansen Zhao}, title = {A Method for Detecting the Exposure of {OCSP} Responder's Session Private Key in {D-OCSP-KIS}}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {215--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_15}, doi = {10.1007/11533733\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/LeeKKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ParkMCKW05, author = {Namje Park and Kiyoung Moon and Kyoil Chung and Seungjoo Kim and Dongho Won}, editor = {Hai Zhuge and Geoffrey C. Fox}, title = {XML-Based Digital Signature Accelerator in Open Mobile Grid Computing}, booktitle = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3795}, pages = {323--333}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11590354\_43}, doi = {10.1007/11590354\_43}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ParkMCKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/NamKKWY05, author = {Junghyun Nam and Hyunjue Kim and Seungjoo Kim and Dongho Won and Hyungkyu Yang}, editor = {Vaidy S. Sunderam and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Practical and Provably-Secure Multicasting over High-Delay Networks}, booktitle = {Computational Science - {ICCS} 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3515}, pages = {493--501}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428848\_65}, doi = {10.1007/11428848\_65}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/NamKKWY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ChoNKW05, author = {Seokhyang Cho and Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3480}, pages = {498--507}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424758\_52}, doi = {10.1007/11424758\_52}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ChoNKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ParkKKW05, author = {Namje Park and Howon Kim and Seungjoo Kim and Dongho Won}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Open Location-Based Service Using Secure Middleware Infrastructure in Web Services}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {1146--1155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_122}, doi = {10.1007/11424826\_122}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/ParkKKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/KimNKW05, author = {Hyunjue Kim and Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {Yo{-}Sung Ho and Hyoung Joong Kim}, title = {Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3768}, pages = {117--128}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11582267\_11}, doi = {10.1007/11582267\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pcm/KimNKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/RheeKKW05, author = {Keunwoo Rhee and Jin Kwak and Seungjoo Kim and Dongho Won}, editor = {Dieter Hutter and Markus Ullmann}, title = {Challenge-Response Based {RFID} Authentication Protocol for Distributed Database Environment}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {70--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_9}, doi = {10.1007/978-3-540-32004-3\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/RheeKKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/NamKW05, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Secure Group Communications over Combined Wired and Wireless Networks}, booktitle = {Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3592}, pages = {90--99}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11537878\_10}, doi = {10.1007/11537878\_10}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/NamKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NamKW05, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {1--9}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_1}, doi = {10.1007/11604938\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NamKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamKW05, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2005}, url = {http://eprint.iacr.org/2005/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/NamCKW04, author = {Junghyun Nam and Seokhyang Cho and Seungjoo Kim and Dongho Won}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Simple and Efficient Group Key Agreement Based on Factoring}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {645--654}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_76}, doi = {10.1007/978-3-540-24707-4\_76}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/NamCKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimKKW04, author = {Jeeyeon Kim and Seungjoo Kim and Jin Kwak and Dongho Won}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {895--902}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_102}, doi = {10.1007/978-3-540-24707-4\_102}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimKKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimW04, author = {Seungjoo Kim and Dongho Won}, editor = {Choonsik Park and Seongtaek Chee}, title = {Threshold Entrusted Undeniable Signature}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {195--203}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_15}, doi = {10.1007/11496618\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamKKW04, author = {Junghyun Nam and Sungduk Kim and Seungjoo Kim and Dongho Won}, title = {Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2004}, url = {http://eprint.iacr.org/2004/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamKKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamLKW04, author = {Junghyun Nam and Jinwoo Lee and Seungjoo Kim and Dongho Won}, title = {DDH-based Group Key Agreement in a Mobile Environment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2004}, url = {http://eprint.iacr.org/2004/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamLKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamKW04, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2004}, url = {http://eprint.iacr.org/2004/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamKW04a, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2004}, url = {http://eprint.iacr.org/2004/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamKW04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamKYW04, author = {Junghyun Nam and Seungjoo Kim and Hyungkyu Yang and Dongho Won}, title = {Secure Group Communications over Combined Wired/Wireless Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2004}, url = {http://eprint.iacr.org/2004/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamKYW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamKW04b, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, title = {A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2004}, url = {http://eprint.iacr.org/2004/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamKW04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChunKLSY03, author = {Kilsoo Chun and Seungjoo Kim and Sangjin Lee and Soo Hak Sung and Seonhee Yoon}, title = {Differential and linear cryptanalysis for 2-round SPNs}, journal = {Inf. Process. Lett.}, volume = {87}, number = {5}, pages = {277--282}, year = {2003}, url = {https://doi.org/10.1016/S0020-0190(03)00333-8}, doi = {10.1016/S0020-0190(03)00333-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ChunKLSY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YenKLM03, author = {Sung{-}Ming Yen and Seungjoo Kim and Seongan Lim and Sang{-}Jae Moon}, title = {{RSA} Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {461--472}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190587}, doi = {10.1109/TC.2003.1190587}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YenKLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LeeCK03, author = {Jung{-}Yeun Lee and Jung Hee Cheon and Seungjoo Kim}, editor = {Marc Joye}, title = {An Analysis of Proxy Signatures: Is a Secure Channel Necessary?}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {68--79}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_5}, doi = {10.1007/3-540-36563-X\_5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LeeCK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KimMZ03, author = {Seungjoo Kim and Masahiro Mambo and Yuliang Zheng}, editor = {Marc Joye}, title = {Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {227--243}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_16}, doi = {10.1007/3-540-36563-X\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KimMZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/KimKPKW03, author = {Jeeyeon Kim and Hyunjo Kwon and Haeryong Park and Seungjoo Kim and Dongho Won}, editor = {Juan Manuel Cueva Lovelle and Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and Luis Joyanes Aguilar and Jos{\'{e}} Emilio Labra Gayo and Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z}, title = {An Improvement of VeriSign's Key Roaming Service Protocol}, booktitle = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain, July 14-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2722}, pages = {281--288}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45068-8\_53}, doi = {10.1007/3-540-45068-8\_53}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwe/KimKPKW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/YieLKK03, author = {Ikkwon Yie and Seongan Lim and Seungjoo Kim and Dongryeol Kim}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Prime Numbers of Diffie-Hellman Groups for {IKE-MODP}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {228--234}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_17}, doi = {10.1007/978-3-540-24582-7\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/YieLKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenKLM01, author = {Sung{-}Ming Yen and Seungjoo Kim and Seongan Lim and Sang{-}Jae Moon}, editor = {Kwangjo Kim}, title = {{RSA} Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {397--413}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_30}, doi = {10.1007/3-540-45861-1\_30}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenKLM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenKLM01a, author = {Sung{-}Ming Yen and Seungjoo Kim and Seongan Lim and Sang{-}Jae Moon}, editor = {Kwangjo Kim}, title = {A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {414--427}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_31}, doi = {10.1007/3-540-45861-1\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenKLM01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KimCJLMWZ01, author = {Seungjoo Kim and Jung Hee Cheon and Marc Joye and Seongan Lim and Masahiro Mambo and Dongho Won and Yuliang Zheng}, editor = {Bahram Honary}, title = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {114--127}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_11}, doi = {10.1007/3-540-45325-3\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/KimCJLMWZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LimKYK01, author = {Seongan Lim and Seungjoo Kim and Ikkwon Yie and Jaemoon Kim}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Comments on a Signature Scheme Based on the Third Order {LFSR} Proposed at {ACISP2001}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {308--315}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_29}, doi = {10.1007/3-540-45311-3\_29}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LimKYK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LimKYKL01, author = {Seongan Lim and Seungjoo Kim and Ikkwon Yie and Jaemoon Kim and Hongsub Lee}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {{XTR} Extended to GF(p\({}^{\mbox{6m}}\))}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {301--312}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_23}, doi = {10.1007/3-540-45537-X\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LimKYKL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/KimKKLPW01, author = {Jeeyeon Kim and Seungjoo Kim and Hyunjo Kwon and Sungjae Lee and Sangjoon Park and Dongho Won}, title = {Forward-Secure Commercial Key Escrow Systems}, booktitle = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge, MA, {USA}}, pages = {211--216}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ENABL.2001.953416}, doi = {10.1109/ENABL.2001.953416}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/KimKKLPW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LimKYL00, author = {Seongan Lim and Seungjoo Kim and Ikkwon Yie and Hongsub Lee}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {A Generalized Takagi-Cryptosystem with a modulus of the form \emph{p\({}^{\mbox{r}}\)q\({}^{\mbox{s}}\)}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {283--294}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_25}, doi = {10.1007/3-540-44495-5\_25}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LimKYL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KimLMP99, author = {Seungjoo Kim and Insoo Lee and Masahiro Mambo and Sungjun Park}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {On the Difficulty of Key Recovery Systems}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {207--224}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_18}, doi = {10.1007/3-540-47790-X\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KimLMP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JoyeKL99, author = {Marc Joye and Seungjoo Kim and Narn{-}Yih Lee}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {Cryptanalysis of Two Group Signature Schemes}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {271--275}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_23}, doi = {10.1007/3-540-47790-X\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JoyeKL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimOW98, author = {Seungjoo Kim and Soohyun Oh and Dongho Won}, title = {One-time self-certified public keys, revisited}, booktitle = {The 1st International Conference on Information Security and Cryptology, {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings}, pages = {59--69}, publisher = {Korea Institute of Information Security and Cryptology {(KIISC)}}, year = {1998}, timestamp = {Fri, 11 Jan 2002 12:38:44 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KimOW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimPW97, author = {Seungjoo Kim and Sangjoon Park and Dongho Won}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Proxy signatures, Revisited}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {223--232}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028478}, doi = {10.1007/BFB0028478}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/KimPW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KimPW97, author = {Seungjoo Kim and Sangjoon Park and Dongho Won}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Group Signatures for Hierarchical Multigroups}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {273--281}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030428}, doi = {10.1007/BFB0030428}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KimPW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KimPW96, author = {Seungjoo Kim and Sungjun Park and Dongho Won}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Convertible Group Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {311--321}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034857}, doi = {10.1007/BFB0034857}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KimPW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.