BibTeX records: Seungjoo Kim

download as .bib file

@article{DBLP:journals/corr/abs-2401-03675,
  author       = {Haena Kim and
                  Yejun Kim and
                  Seungjoo Kim},
  title        = {A Study on the Security Requirements Analysis to build a Zero Trust-based
                  Remote Work Environment},
  journal      = {CoRR},
  volume       = {abs/2401.03675},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.03675},
  doi          = {10.48550/ARXIV.2401.03675},
  eprinttype    = {arXiv},
  eprint       = {2401.03675},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-03675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-11171,
  author       = {Hojung Yang and
                  Suhyeon Lee and
                  Seungjoo Kim},
  title        = {A Tip for {IOTA} Privacy: {IOTA} Light Node Deanonymization via Tip
                  Selection},
  journal      = {CoRR},
  volume       = {abs/2403.11171},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.11171},
  doi          = {10.48550/ARXIV.2403.11171},
  eprinttype    = {arXiv},
  eprint       = {2403.11171},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-11171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LeeK23,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake
                  cryptocurrencies},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {16},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.6585},
  doi          = {10.1002/CPE.6585},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LeeK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/0001K23,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Rethinking selfish mining under pooled mining},
  journal      = {{ICT} Express},
  volume       = {9},
  number       = {3},
  pages        = {356--361},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.icte.2022.03.003},
  doi          = {10.1016/J.ICTE.2022.03.003},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ict-express/0001K23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AhnKK23,
  author       = {Taehyun Ahn and
                  Jiwon Kwak and
                  Seungjoo Kim},
  editor       = {Hwajeong Seo and
                  Suhri Kim},
  title        = {mdTLS: How to Make Middlebox-Aware {TLS} More Efficient?},
  booktitle    = {Information Security and Cryptology - {ICISC} 2023 - 26th International
                  Conference on Information Security and Cryptology, {ICISC} 2023, Seoul,
                  South Korea, November 29 - December 1, 2023, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14562},
  pages        = {39--59},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1238-0\_3},
  doi          = {10.1007/978-981-97-1238-0\_3},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AhnKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-03573,
  author       = {Taehyun Ahn and
                  Jiwon Kwak and
                  Seungjoo Kim},
  title        = {mdTLS: How to Make middlebox-aware {TLS} more efficient?},
  journal      = {CoRR},
  volume       = {abs/2306.03573},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.03573},
  doi          = {10.48550/ARXIV.2306.03573},
  eprinttype    = {arXiv},
  eprint       = {2306.03573},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-03573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-16818,
  author       = {Yejun Kim and
                  Kwangsoo Cho and
                  Seungjoo Kim},
  title        = {Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions},
  journal      = {CoRR},
  volume       = {abs/2312.16818},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.16818},
  doi          = {10.48550/ARXIV.2312.16818},
  eprinttype    = {arXiv},
  eprint       = {2312.16818},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-16818.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LeeK22,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {2602--2618},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3136328},
  doi          = {10.1109/ACCESS.2021.3136328},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LeeK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KangK22,
  author       = {Sooyoung Kang and
                  Seungjoo Kim},
  title        = {CIA-level driven secure {SDLC} framework for integrating security
                  into {SDLC} process},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {13},
  number       = {10},
  pages        = {4601--4624},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12652-021-03450-z},
  doi          = {10.1007/S12652-021-03450-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/KangK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/0001LK22,
  author       = {Suhyeon Lee and
                  Donghwan Lee and
                  Seungjoo Kim},
  editor       = {Maurice Herlihy and
                  Neha Narula},
  title        = {Block Double-Submission Attack: Block Withholding Can Be Self-Destructive},
  booktitle    = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022},
  pages        = {232--243},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3558535.3559787},
  doi          = {10.1145/3558535.3559787},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aft/0001LK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeCK22,
  author       = {Suhyeon Lee and
                  Kwangsoo Cho and
                  Seungjoo Kim},
  title        = {Do You Really Need to Disguise Normal Servers as Honeypots?},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville,
                  MD, USA, November 28 - December 2, 2022},
  pages        = {166--172},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MILCOM55135.2022.10017586},
  doi          = {10.1109/MILCOM55135.2022.10017586},
  timestamp    = {Wed, 08 Feb 2023 17:46:14 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/LeeCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05425,
  author       = {Suhyeon Lee and
                  Donghwan Lee and
                  Seungjoo Kim},
  title        = {Block Double-Submission Attack: Block Withholding Can Be Self-Destructive},
  journal      = {CoRR},
  volume       = {abs/2208.05425},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05425},
  doi          = {10.48550/ARXIV.2208.05425},
  eprinttype    = {arXiv},
  eprint       = {2208.05425},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05425.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-17399,
  author       = {Suhyeon Lee and
                  Kwangsoo Cho and
                  Seungjoo Kim},
  title        = {Do You Really Need to Disguise Normal Servers as Honeypots?},
  journal      = {CoRR},
  volume       = {abs/2210.17399},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.17399},
  doi          = {10.48550/ARXIV.2210.17399},
  eprinttype    = {arXiv},
  eprint       = {2210.17399},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-17399.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChaBK20,
  author       = {Sungyong Cha and
                  Seungsoo Baek and
                  Seungjoo Kim},
  title        = {Blockchain Based Sensitive Data Management by Using Key Escrow Encryption
                  System From the Perspective of Supply Chain},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {154269--154280},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3017871},
  doi          = {10.1109/ACCESS.2020.3017871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChaBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/0001K20,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies},
  booktitle    = {CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies
                  and Blockchains for Distributed Systems, London, UK, September 25,
                  2020},
  pages        = {7--11},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3410699.3413791},
  doi          = {10.1145/3410699.3413791},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/0001K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeK20,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Short Selling Attack: {A} Self-Destructive But Profitable 51{\%} Attack
                  On PoS Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0001K19,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Countering Block Withholding Attack Efficiently},
  booktitle    = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May
                  2, 2019},
  pages        = {330--335},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFCOMW.2019.8845116},
  doi          = {10.1109/INFCOMW.2019.8845116},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/0001K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeK19,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Detective Mining: Selfish Mining Becomes Unrealistic under Mining
                  Pool Environment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChaBKK18,
  author       = {Sungyong Cha and
                  Seungsoo Baek and
                  Sooyoung Kang and
                  Seungjoo Kim},
  title        = {Security Evaluation Framework for Military IoT Devices},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {6135845:1--6135845:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/6135845},
  doi          = {10.1155/2018/6135845},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChaBKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494},
  doi          = {10.1145/3196494},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeK18,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Countering Block Withholding Attack Effciently},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1211},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeK18a,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Pooled Mining Makes Selfish Mining Tricky},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1230},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeK18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/KangK17,
  author       = {Sooyoung Kang and
                  Seungjoo Kim},
  title        = {How to Obtain Common Criteria Certification of Smart {TV} for Home
                  IoT Security and Reliability},
  journal      = {Symmetry},
  volume       = {9},
  number       = {10},
  pages        = {233},
  year         = {2017},
  url          = {https://doi.org/10.3390/sym9100233},
  doi          = {10.3390/SYM9100233},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/KangK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LeeK17a,
  author       = {Jong Han Lee and
                  Seungjoo Kim},
  title        = {Analysis and Security Evaluation of Security Threat on Broadcasting
                  Service},
  journal      = {Wirel. Pers. Commun.},
  volume       = {95},
  number       = {4},
  pages        = {4149--4169},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4056-z},
  doi          = {10.1007/S11277-017-4056-Z},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LeeK17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BaekSK16,
  author       = {Seungsoo Baek and
                  Seung{-}Hyun Seo and
                  Seungjoo Kim},
  title        = {Preserving Patient's Anonymity for Mobile Healthcare System in IoT
                  Environment},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {12},
  number       = {9},
  pages        = {2171642},
  year         = {2016},
  url          = {https://doi.org/10.1177/155014772171642},
  doi          = {10.1177/155014772171642},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BaekSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChoLSK16,
  author       = {Kyumin Cho and
                  Hyunwoo Lim and
                  Taeshik Shon and
                  Seungjoo Kim},
  title        = {A novel security architecture of electronic vehicle system for smart
                  grid communication},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {1},
  pages        = {214--231},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-015-1552-3},
  doi          = {10.1007/S11227-015-1552-3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChoLSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LeeCLK15,
  author       = {Jonghan Lee and
                  Kyumin Cho and
                  ChangYong Lee and
                  Seungjoo Kim},
  title        = {VoIP-aware network attack detection based on statistics and behavior
                  of {SIP} traffic},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {5},
  pages        = {872--880},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-014-0289-8},
  doi          = {10.1007/S12083-014-0289-8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LeeCLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/BaekSK15,
  author       = {Seungsoo Baek and
                  Seung{-}Hyun Seo and
                  Seungjoo Kim},
  title        = {Preserving biosensor users' anonymity over wireless cellular network},
  booktitle    = {Seventh International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2015, Sapporo, Japan, July 7-10, 2015},
  pages        = {470--475},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICUFN.2015.7182588},
  doi          = {10.1109/ICUFN.2015.7182588},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/BaekSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChoiJWK13,
  author       = {Donghyun Choi and
                  Hanjae Jeong and
                  Dongho Won and
                  Seungjoo Kim},
  title        = {Hybrid Key Management Architecture for Robust {SCADA} Systems},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {29},
  number       = {2},
  pages        = {281--298},
  year         = {2013},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2013/201303\_06.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChoiJWK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/LeeCWK13,
  author       = {Sangsik Lee and
                  Donghyun Choi and
                  Dongho Won and
                  Seungjoo Kim},
  title        = {Vulnerabilities and Countermeasures of Commercial Online Music Streaming
                  Services in Korea},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {3},
  pages        = {520--527},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.3.520-527},
  doi          = {10.4304/JSW.8.3.520-527},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/LeeCWK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/ParkKK13,
  author       = {Minsu Park and
                  Sunghoon Kang and
                  Seungjoo Kim},
  title        = {A study on weakness and improvement of Cloud Shredder},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2013, Jeju Island, South Korea, 4-16 October 2013},
  pages        = {1107--1113},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICTC.2013.6675569},
  doi          = {10.1109/ICTC.2013.6675569},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/ParkKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SeoCHK12,
  author       = {Seung{-}Hyun Seo and
                  Kyu Young Choi and
                  Jung Yeon Hwang and
                  Seungjoo Kim},
  title        = {Efficient certificateless proxy signature scheme with provable security},
  journal      = {Inf. Sci.},
  volume       = {188},
  pages        = {322--337},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2011.11.005},
  doi          = {10.1016/J.INS.2011.11.005},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SeoCHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cube/JoKW12,
  author       = {Heasuk Jo and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Vidyasagar M. Potdar and
                  Debajyoti Mukhopadhyay},
  title        = {Weakness and simple improvement of anonymous mutual authentication
                  protocol with link-layer},
  booktitle    = {{CUBE} International {IT} Conference {\&} Exhibition, {CUBE} '12,
                  Pune, India - September 03 - 06, 2012},
  pages        = {816--819},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381716.2381870},
  doi          = {10.1145/2381716.2381870},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cube/JoKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/JeongKW12,
  author       = {Hanjae Jeong and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Suk{-}Han Lee and
                  Lajos Hanzo and
                  Roslan Ismail and
                  Dongsoo S. Kim and
                  Min Young Chung and
                  Sang{-}Won Lee},
  title        = {On the security of an novel protocol for downloadable {CAS}},
  booktitle    = {The 6th International Conference on Ubiquitous Information Management
                  and Communication, {ICUIMC} '12, Kuala Lumpur, Malaysia, February
                  20-22, 2012},
  pages        = {65:1--65:5},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2184751.2184831},
  doi          = {10.1145/2184751.2184831},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/JeongKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/JoKW11,
  author       = {Heasuk Jo and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Advanced Information Security Management Evaluation System},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {5},
  number       = {6},
  pages        = {1192--1213},
  year         = {2011},
  url          = {https://doi.org/10.3837/tiis.2011.06.006},
  doi          = {10.3837/TIIS.2011.06.006},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/JoKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LeeSWK11,
  author       = {Byunghee Lee and
                  Kyungho Son and
                  Dongho Won and
                  Seungjoo Kim},
  title        = {Secure Data Deletion for {USB} Flash Memory},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {27},
  number       = {3},
  pages        = {933--952},
  year         = {2011},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2011/201105\_08.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LeeSWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/KwakLWK11,
  author       = {Kyoungju Kwak and
                  Kwang{-}Woo Lee and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Suk{-}Han Lee and
                  Lajos Hanzo and
                  Min Young Chung and
                  Sang{-}Won Lee and
                  Kwangsu Cho},
  title        = {Analysis and countermeasures of security vulnerability on portal sites},
  booktitle    = {Proceedings of the 5th International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea,
                  February 21 - 23, 2011},
  pages        = {98},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1968613.1968728},
  doi          = {10.1145/1968613.1968728},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/KwakLWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LeeKW10,
  author       = {Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Enhancement of two-factor authenticated key exchange protocols in
                  public wireless LANs},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {213--223},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.08.007},
  doi          = {10.1016/J.COMPELECENG.2009.08.007},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LeeKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeePMKW10,
  author       = {Yunho Lee and
                  Sangjoon Park and
                  Masahiro Mambo and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Towards trustworthy e-voting using paper receipts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {32},
  number       = {5-6},
  pages        = {305--311},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.csi.2010.03.001},
  doi          = {10.1016/J.CSI.2010.03.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LeePMKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/JeongWK10,
  author       = {Hanjae Jeong and
                  Dongho Won and
                  Seungjoo Kim},
  title        = {Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication
                  Protocol},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {26},
  number       = {5},
  pages        = {1845--1858},
  year         = {2010},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2010/201009\_18.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/JeongWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/SonLWK10,
  author       = {Seungjin Son and
                  Kwang{-}Woo Lee and
                  Dongho Won and
                  Seungjoo Kim},
  title        = {U-healthcare system protecting privacy based on cloaker},
  booktitle    = {2010 {IEEE} International Conference on Bioinformatics and Biomedicine
                  Workshops, {BIBMW} 2010, Hong Kong, December 18, 2010},
  pages        = {417--423},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/BIBMW.2010.5703838},
  doi          = {10.1109/BIBMW.2010.5703838},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bibm/SonLWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/JoKW10,
  author       = {Heasuk Jo and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {David Taniar and
                  Osvaldo Gervasi and
                  Beniamino Murgante and
                  Eric Pardede and
                  Bernady O. Apduhan},
  title        = {A Study on Comparative Analysis of the Information Security Management
                  Systems},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2010, International
                  Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6019},
  pages        = {510--519},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12189-0\_44},
  doi          = {10.1007/978-3-642-12189-0\_44},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/JoKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/LeeCWK10,
  author       = {Sangsik Lee and
                  Donghyun Choi and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Kwan{-}Ho You and
                  Sang{-}Won Lee and
                  Won Kim and
                  Dongho Won},
  title        = {Security analysis on commercial online music streaming service and
                  countermeasures},
  booktitle    = {Proceedings of the 4th International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2010, Suwon, Republic of Korea,
                  January 14-15, 2010},
  pages        = {59},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/2108616.2108688},
  doi          = {10.1145/2108616.2108688},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/LeeCWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HwangJCKWK10,
  author       = {Yu{-}na Hwang and
                  Hanjae Jeong and
                  Sungkyu Cho and
                  Songyi Kim and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {A Proposal of Appropriate Evaluation Scheme for Exchangeable {CAS}
                  (XCAS),},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {217--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_16},
  doi          = {10.1007/978-3-642-12827-1\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HwangJCKWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LeeLWK10,
  author       = {Kwang{-}Woo Lee and
                  Yunho Lee and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Protection Profile for Secure E-Voting Systems},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {386--397},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_28},
  doi          = {10.1007/978-3-642-12827-1\_28},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LeeLWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/KimWLKK10,
  author       = {Taehyun Kim and
                  Dongho Won and
                  Kwang{-}Woo Lee and
                  Hogab Kang and
                  Seungjoo Kim},
  title        = {Automated {DCI} compliance test system for Digital Cinema Entities},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2010, Sixth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2010: International Conference on Networked
                  Computing, {IMS} 2010: International Conference on Advanced Information
                  Management and Service, {IDC} 2010: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 16-18, 2010},
  pages        = {434--439},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5572073/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncm/KimWLKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/RheeLWNK10,
  author       = {Keunwoo Rhee and
                  Byunghee Lee and
                  Dongho Won and
                  Hac Yun Na and
                  Seungjoo Kim},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell
                  Relay Routing Protocol for Sensor Networks},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.8},
  doi          = {10.1109/SECURWARE.2010.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/RheeLWNK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wism/KimKW10,
  author       = {Mijin Kim and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Fu Lee Wang and
                  Zhiguo Gong and
                  Xiangfeng Luo and
                  Jingsheng Lei},
  title        = {An Exquisite Authentication Scheme with Key Agreement Preserving User
                  Anonymity},
  booktitle    = {Web Information Systems and Mining - International Conference, {WISM}
                  2010, Sanya, China, October 23-24, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6318},
  pages        = {244--253},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16515-3\_31},
  doi          = {10.1007/978-3-642-16515-3\_31},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wism/KimKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/LeeHWK09,
  author       = {Yoonyoung Lee and
                  Soonhaeng Hur and
                  Dongho Won and
                  Seungjoo Kim},
  title        = {Cipher Suite Setting Problem of {SSL} Protocol and it's Solutions},
  booktitle    = {23rd International Conference on Advanced Information Networking and
                  Applications, {AINA} 2009, Workshops Proceedings, Bradford, United
                  Kingdom, May 26-29, 2009},
  pages        = {140--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WAINA.2009.76},
  doi          = {10.1109/WAINA.2009.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/LeeHWK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KimLKW09,
  author       = {Mijin Kim and
                  Byunghee Lee and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Alan Chin{-}Chen Chang and
                  Thanos Vasilakos and
                  Mingchu Li and
                  Kouichi Sakurai},
  title        = {Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication
                  Scheme},
  booktitle    = {Communication and Networking - International Conference, {FGCN/ACN}
                  2009, Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {56},
  pages        = {421--430},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10844-0\_49},
  doi          = {10.1007/978-3-642-10844-0\_49},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KimLKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/YiKW09,
  author       = {Wansuck Yi and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Osvaldo Gervasi and
                  David Taniar and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {Smart Card Based {AKE} Protocol Using Biometric Information in Pervasive
                  Computing Environments},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2009, International
                  Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5593},
  pages        = {182--190},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02457-3\_16},
  doi          = {10.1007/978-3-642-02457-3\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/YiKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LeeLKW09,
  author       = {Kwang{-}Woo Lee and
                  Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Osvaldo Gervasi and
                  David Taniar and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {A Practical Approach to a Reliable Electronic Election},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2009, International
                  Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5593},
  pages        = {191--203},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02457-3\_17},
  doi          = {10.1007/978-3-642-02457-3\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LeeLKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimJKW09,
  author       = {Mijin Kim and
                  Heasuk Jo and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Osvaldo Gervasi and
                  David Taniar and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {Security Weakness in a Provable Secure Authentication Protocol Given
                  Forward Secure Session Key},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2009, International
                  Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5593},
  pages        = {204--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02457-3\_18},
  doi          = {10.1007/978-3-642-02457-3\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimJKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JoJLKW09,
  author       = {Heasuk Jo and
                  Woongryul Jeon and
                  Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Security Specification for Conversion Technologies of Heterogeneous
                  {DRM} Systems},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_15},
  doi          = {10.1007/978-3-642-00843-6\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JoJLKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/JoLKKW09,
  author       = {Heasuk Jo and
                  Yunho Lee and
                  Mijin Kim and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Chen Rui and
                  Jong Hyung Lee and
                  Jian Wang and
                  Gang Kou},
  title        = {Off-Line Password-Guessing Attack to Yang's and Huang's Authentication
                  Schemes for Session Initiation Protocol},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2009, Fifth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2009: International Conference on Networked
                  Computing, {IMS} 2009: International Conference on Advanced Information
                  Management and Service, {IDC} 2009: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 25-27, 2009},
  pages        = {618--621},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCM.2009.251},
  doi          = {10.1109/NCM.2009.251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/JoLKKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/HongJKWP08,
  author       = {Sumin Hong and
                  Woongryul Jeon and
                  Seungjoo Kim and
                  Dongho Won and
                  Choonsik Park},
  title        = {The Vulnerabilities Analysis of Fuzzy Vault Using Password},
  booktitle    = {International Conference on Bio-Science and Bio-Technology, {BSBT}
                  2008, part of the Second International Conference on Future Generation
                  Communication and Networking, {FGCN} 2008, Volume 3, Hainan Island,
                  China, December 13-15, 2008},
  pages        = {76--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FGCN.2008.211},
  doi          = {10.1109/FGCN.2008.211},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/HongJKWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/LeeKW08,
  author       = {Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {How to Trust {DRE} Voting Machines Preserving Voter Privacy},
  booktitle    = {2008 {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2008, Xi'an, China, October 22-24, 2008},
  pages        = {302--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICEBE.2008.37},
  doi          = {10.1109/ICEBE.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/LeeKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/ParkCKW08,
  author       = {Namje Park and
                  Dooho Choi and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Enforcing security in mobile {RFID} networks multilateral approaches
                  and solutions},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  pages        = {999--1002},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575267},
  doi          = {10.1109/NOMS.2008.4575267},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/ParkCKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggrapha/PengYJSK08,
  author       = {Yachi Peng and
                  Maowei Yu and
                  Woo sok Jang and
                  Sue Gyeong Syn and
                  Seungjoo Kim},
  editor       = {Tomoe Moriyama and
                  Stephanie Choo},
  title        = {Liuliu Pangpang},
  booktitle    = {International Conference on Computer Graphics and Interactive Techniques,
                  {SIGGRAPH} {ASIA} 2008, Singapore, December 10-13, 2008, Art Gallery
                  {\&} Emerging Technologies},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1504229.1504244},
  doi          = {10.1145/1504229.1504244},
  timestamp    = {Wed, 07 Apr 2021 12:19:35 +0200},
  biburl       = {https://dblp.org/rec/conf/siggrapha/PengYJSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiCWK08,
  author       = {Donghyun Choi and
                  Sungkyu Cho and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Protection Profile for Connected Interoperable {DRM} Framework},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {320--332},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_24},
  doi          = {10.1007/978-3-642-00306-6\_24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiCWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NamKPW07,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Sangjoon Park and
                  Dongho Won},
  title        = {Security Analysis of a Nonce-Based User Authentication Scheme Using
                  Smart Cards},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {299--302},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.299},
  doi          = {10.1093/IETFEC/E90-A.1.299},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NamKPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/NamLKW07,
  author       = {Junghyun Nam and
                  Youngsook Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Security weakness in a three-party pairing-based protocol for password
                  authenticated key exchange},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {6},
  pages        = {1364--1375},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2006.09.001},
  doi          = {10.1016/J.INS.2006.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/NamLKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/ChoiLKKW07,
  author       = {Donghyun Choi and
                  Yunho Lee and
                  Hogab Kang and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {An Efficient and Secure Rights Sharing Method for {DRM} System Against
                  Replay Attack},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {135--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_16},
  doi          = {10.1007/978-3-540-73547-2\_16},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/ChoiLKKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awic/ParkKW07,
  author       = {Namje Park and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Katarzyna Wegrzyn{-}Wolska and
                  Piotr S. Szczepaniak},
  title        = {Privacy Preserving Enhanced Service Mechanism in Mobile {RFID} Network},
  booktitle    = {Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic
                  Web Intelligence Conference - {AWIC} 2007, Fontainebleau, France,
                  June 25 - 27, 2007},
  series       = {Advances in Soft Computing},
  volume       = {43},
  pages        = {278--283},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72575-6\_45},
  doi          = {10.1007/978-3-540-72575-6\_45},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/awic/ParkKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ParkNKW07,
  author       = {Sangjoon Park and
                  Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Masayuki Abe},
  title        = {Efficient Password-Authenticated Key Exchange Based on {RSA}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_20},
  doi          = {10.1007/11967668\_20},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ParkNKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ShinCLPKW07,
  author       = {Donghwi Shin and
                  Youngsung Choi and
                  Yunho Lee and
                  Sangjoon Park and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Constantine Stephanidis},
  title        = {Security Analysis on the Authentication Mechanisms of Korean Popular
                  Messengers},
  booktitle    = {Universal Access in Human Computer Interaction. Coping with Diversity,
                  4th International Conference on Universal Access in Human-Computer
                  Interaction, {UAHCI} 2007, Held as Part of {HCI} International 2007,
                  Beijing, China, July 22-27, 2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4554},
  pages        = {547--552},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73279-2\_61},
  doi          = {10.1007/978-3-540-73279-2\_61},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ShinCLPKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/LeeAKW07,
  author       = {YoungGyo Lee and
                  Jeonghee Ahn and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Ngoc Thanh Nguyen and
                  Adam Grzech and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {A Countermeasure of Fake Root Key Installation Using One-Time Hash
                  Chain},
  booktitle    = {Agent and Multi-Agent Systems: Technologies and Applications, First
                  {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland,
                  May 31- June 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4496},
  pages        = {1007--1016},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72830-6\_107},
  doi          = {10.1007/978-3-540-72830-6\_107},
  timestamp    = {Thu, 16 Mar 2023 20:00:31 +0100},
  biburl       = {https://dblp.org/rec/conf/kesamsta/LeeAKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NamKW06,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols
                  Using Passwords},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {209--212},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.209},
  doi          = {10.1093/IETFEC/E89-A.1.209},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NamKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NamKW06a,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {213--218},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.213},
  doi          = {10.1093/IETFEC/E89-A.1.213},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NamKW06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeKW06,
  author       = {Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {7},
  pages        = {2084--2087},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.7.2084},
  doi          = {10.1093/IETFEC/E89-A.7.2084},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/ParkKKWK06,
  author       = {Namje Park and
                  Jin Kwak and
                  Seungjoo Kim and
                  Dongho Won and
                  Howon Kim},
  editor       = {Heng Tao Shen and
                  Jinbao Li and
                  Minglu Li and
                  Jun Ni and
                  Wei Wang},
  title        = {{WIPI} Mobile Platform with Secure Service for Mobile {RFID} Network
                  Environment},
  booktitle    = {Advanced Web and Network Technologies, and Applications, APWeb 2006
                  International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China,
                  January 16-18, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3842},
  pages        = {741--748},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11610496\_100},
  doi          = {10.1007/11610496\_100},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apweb/ParkKKWK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/KwakRPKKSW06,
  author       = {Jin Kwak and
                  Keunwoo Rhee and
                  Namje Park and
                  Howon Kim and
                  Seungjoo Kim and
                  Kouichi Sakurai and
                  Dongho Won},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {An {RFID} System Based {MCLT} System with Improved Privacy},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {579--590},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_59},
  doi          = {10.1007/11807964\_59},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/KwakRPKKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LeeAKW06,
  author       = {YoungGyo Lee and
                  Jeonghee Ahn and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {A {PKI} System for Detecting the Exposure of a User's Secret Key},
  booktitle    = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4043},
  pages        = {248--250},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774716\_20},
  doi          = {10.1007/11774716\_20},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LeeAKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LeeNKW06,
  author       = {Youngsook Lee and
                  Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Two Efficient and Secure Authentication Schemes Using Smart Cards},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3984},
  pages        = {858--866},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751649\_94},
  doi          = {10.1007/11751649\_94},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LeeNKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ZhengKSLKW06,
  author       = {He Zheng and
                  Jin Kwak and
                  Kyungho Son and
                  Wansuk Lee and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Confidence Value Based Multi Levels of Authentication for Ubiquitous
                  Computing Environments},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3981},
  pages        = {954--963},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751588\_99},
  doi          = {10.1007/11751588\_99},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ZhengKSLKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/RheeKYPPYKW06,
  author       = {Keunwoo Rhee and
                  Jin Kwak and
                  Wan S. Yi and
                  Chanho Park and
                  Sangjoon Park and
                  Hyungkyu Yang and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Marcin S. Szczuka and
                  Daniel Howard and
                  Dominik Slezak and
                  Haeng{-}Kon Kim and
                  Tai{-}Hoon Kim and
                  Il Seok Ko and
                  Geuk Lee and
                  Peter M. A. Sloot},
  title        = {Efficient {RFID} Authentication Protocol for Minimizing {RFID} Tag
                  Computation},
  booktitle    = {Advances in Hybrid Information Technology, First International Conference,
                  {ICHIT} 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4413},
  pages        = {607--616},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77368-9\_59},
  doi          = {10.1007/978-3-540-77368-9\_59},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ichit/RheeKYPPYKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-8/ParkKWK06,
  author       = {Namje Park and
                  Seungjoo Kim and
                  Dongho Won and
                  Howon Kim},
  editor       = {Pedro Cuenca and
                  Luis Orozco{-}Barbosa},
  title        = {Security Analysis and Implementation Leveraging Globally Networked
                  RFIDs},
  booktitle    = {Personal Wireless Communications, {IFIP} {TC6} 11th International
                  Conference, {PWC} 2006, Albacete, Spain, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4217},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11872153\_43},
  doi          = {10.1007/11872153\_43},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip6-8/ParkKWK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/KimKCLW06,
  author       = {Jeeyeon Kim and
                  Seungjoo Kim and
                  Kilsoo Chun and
                  Jaeil Lee and
                  Dongho Won},
  editor       = {Geyong Min and
                  Beniamino Di Martino and
                  Laurence Tianruo Yang and
                  Minyi Guo and
                  Gudula R{\"{u}}nger},
  title        = {Group Key Agreement Protocol Among Mobile Devices in Different Cells},
  booktitle    = {Frontiers of High Performance Computing and Networking - {ISPA} 2006
                  Workshops, {ISPA} 2006 International Workshops, FHPCN, XHPC, S-GRACE,
                  GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento,
                  Italy, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4331},
  pages        = {1090--1097},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11942634\_112},
  doi          = {10.1007/11942634\_112},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/KimKCLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/ParkKKWK06,
  author       = {Namje Park and
                  Jin Kwak and
                  Seungjoo Kim and
                  Dongho Won and
                  Howon Kim},
  editor       = {Bogdan Gabrys and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Security Techniques Based on {EPC} Gen2 Tag for Secure Mobile {RFID}
                  Network Services},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 10th
                  International Conference, {KES} 2006, Bournemouth, UK, October 9-11,
                  2006, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4251},
  pages        = {924--934},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11892960\_111},
  doi          = {10.1007/11892960\_111},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kes/ParkKKWK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/LeeJKW06,
  author       = {Yunho Lee and
                  Heasuk Jo and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {An Efficient Dispute Resolving Method for Digital Images},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {331--341},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_57},
  doi          = {10.1007/11915034\_57},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/LeeJKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2005,
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734727},
  doi          = {10.1007/11734727},
  isbn         = {3-540-33354-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLKW06,
  author       = {Yunho Lee and
                  Kwang{-}Woo Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Towards Trustworthy e-Voting using Paper Receipts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/NamKW05,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key
                  Agreement scheme for low-power mobile devices},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {9},
  number       = {5},
  pages        = {429--431},
  year         = {2005},
  url          = {https://doi.org/10.1109/LCOMM.2005.1431161},
  doi          = {10.1109/LCOMM.2005.1431161},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/NamKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/NamLKW05,
  author       = {Junghyun Nam and
                  Jinwoo Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {DDH-based group key agreement in a mobile environment},
  journal      = {J. Syst. Softw.},
  volume       = {78},
  number       = {1},
  pages        = {73--83},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jss.2004.10.024},
  doi          = {10.1016/J.JSS.2004.10.024},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/NamLKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awic/ParkKCKW05,
  author       = {Namje Park and
                  Howon Kim and
                  Kyoil Chung and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Piotr S. Szczepaniak and
                  Janusz Kacprzyk and
                  Adam Niewiadomski},
  title        = {XKMS-Based Key Management for Open {LBS} in Web Services Environment},
  booktitle    = {Advances in Web Intelligence Third International Atlantic Web IntelligenceConference,
                  {AWIC} 2005, Lodz, Poland, June 6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3528},
  pages        = {367--373},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11495772\_57},
  doi          = {10.1007/11495772\_57},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/awic/ParkKCKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/ParkMKKW05,
  author       = {Namje Park and
                  Kiyoung Moon and
                  Howon Kim and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Kurt Bauknecht and
                  Birgit Pr{\"{o}}ll and
                  Hannes Werthner},
  title        = {XML-Based Security Acceleration Methods Supporting Fast Mobile Grid},
  booktitle    = {E-Commerce and Web Technologies: 6th International Conference, EC-Web
                  2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3590},
  pages        = {316--326},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545163\_32},
  doi          = {10.1007/11545163\_32},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/ParkMKKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KwakROKW05,
  author       = {Jin Kwak and
                  Keunwoo Rhee and
                  Soohyun Oh and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {{RFID} System with Fairness Within the Framework of Security and Privacy},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {142--152},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_12},
  doi          = {10.1007/11601494\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KwakROKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/LeeLKWY05,
  author       = {Yunho Lee and
                  Kwang{-}Woo Lee and
                  Seungjoo Kim and
                  Dongho Won and
                  Hyungkyu Yang},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {A Method for Deciding Quantization Steps in {QIM} Watermarking Schemes},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {965--975},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_99},
  doi          = {10.1007/11596042\_99},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/LeeLKWY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LeeKKW05,
  author       = {YoungGyo Lee and
                  In{-}Jung Kim and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {A Method for Detecting the Exposure of {OCSP} Responder's Session
                  Private Key in {D-OCSP-KIS}},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_15},
  doi          = {10.1007/11533733\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LeeKKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ParkMCKW05,
  author       = {Namje Park and
                  Kiyoung Moon and
                  Kyoil Chung and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Hai Zhuge and
                  Geoffrey C. Fox},
  title        = {XML-Based Digital Signature Accelerator in Open Mobile Grid Computing},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference,
                  Beijing, China, November 30 - December 3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3795},
  pages        = {323--333},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11590354\_43},
  doi          = {10.1007/11590354\_43},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ParkMCKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/NamKKWY05,
  author       = {Junghyun Nam and
                  Hyunjue Kim and
                  Seungjoo Kim and
                  Dongho Won and
                  Hyungkyu Yang},
  editor       = {Vaidy S. Sunderam and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Practical and Provably-Secure Multicasting over High-Delay Networks},
  booktitle    = {Computational Science - {ICCS} 2005, 5th International Conference,
                  Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3515},
  pages        = {493--501},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428848\_65},
  doi          = {10.1007/11428848\_65},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/NamKKWY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ChoNKW05,
  author       = {Seokhyang Cho and
                  Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3480},
  pages        = {498--507},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424758\_52},
  doi          = {10.1007/11424758\_52},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ChoNKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ParkKKW05,
  author       = {Namje Park and
                  Howon Kim and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Open Location-Based Service Using Secure Middleware Infrastructure
                  in Web Services},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {1146--1155},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_122},
  doi          = {10.1007/11424826\_122},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/ParkKKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/KimNKW05,
  author       = {Hyunjue Kim and
                  Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Yo{-}Sung Ho and
                  Hyoung Joong Kim},
  title        = {Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2005, 6th Pacific-Rim
                  Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3768},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11582267\_11},
  doi          = {10.1007/11582267\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pcm/KimNKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/RheeKKW05,
  author       = {Keunwoo Rhee and
                  Jin Kwak and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Challenge-Response Based {RFID} Authentication Protocol for Distributed
                  Database Environment},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {70--84},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_9},
  doi          = {10.1007/978-3-540-32004-3\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/RheeKKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/NamKW05,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Secure Group Communications over Combined Wired and Wireless Networks},
  booktitle    = {Trust, Privacy and Security in Digital Business: Second International
                  Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3592},
  pages        = {90--99},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537878\_10},
  doi          = {10.1007/11537878\_10},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/NamKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NamKW05,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Security Weakness in Ren et al.'s Group Key Agreement Scheme Built
                  on Secure Two-Party Protocols},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_1},
  doi          = {10.1007/11604938\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NamKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamKW05,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Security Weakness in a Three-Party Password-Based Key Exchange Protocol
                  Using Weil Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/NamCKW04,
  author       = {Junghyun Nam and
                  Seokhyang Cho and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {Simple and Efficient Group Key Agreement Based on Factoring},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {645--654},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24707-4\_76},
  doi          = {10.1007/978-3-540-24707-4\_76},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/NamCKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimKKW04,
  author       = {Jeeyeon Kim and
                  Seungjoo Kim and
                  Jin Kwak and
                  Dongho Won},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {Cryptanalysis and Improvement of Password Authenticated Key Exchange
                  Scheme between Clients with Different Passwords},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {895--902},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24707-4\_102},
  doi          = {10.1007/978-3-540-24707-4\_102},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimKKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimW04,
  author       = {Seungjoo Kim and
                  Dongho Won},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Threshold Entrusted Undeniable Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {195--203},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_15},
  doi          = {10.1007/11496618\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamKKW04,
  author       = {Junghyun Nam and
                  Sungduk Kim and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Provably-Secure and Communication-Efficient Scheme for Dynamic Group
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamKKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamLKW04,
  author       = {Junghyun Nam and
                  Jinwoo Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {DDH-based Group Key Agreement in a Mobile Environment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamLKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamKW04,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement
                  Scheme for Low-Power Mobile Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamKW04a,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamKW04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamKYW04,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Hyungkyu Yang and
                  Dongho Won},
  title        = {Secure Group Communications over Combined Wired/Wireless Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamKYW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamKW04b,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {A weakness in Sun-Chen-Hwang's three-party key agreement protocols
                  using passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamKW04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChunKLSY03,
  author       = {Kilsoo Chun and
                  Seungjoo Kim and
                  Sangjin Lee and
                  Soo Hak Sung and
                  Seonhee Yoon},
  title        = {Differential and linear cryptanalysis for 2-round SPNs},
  journal      = {Inf. Process. Lett.},
  volume       = {87},
  number       = {5},
  pages        = {277--282},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0020-0190(03)00333-8},
  doi          = {10.1016/S0020-0190(03)00333-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ChunKLSY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YenKLM03,
  author       = {Sung{-}Ming Yen and
                  Seungjoo Kim and
                  Seongan Lim and
                  Sang{-}Jae Moon},
  title        = {{RSA} Speedup with Chinese Remainder Theorem Immune against Hardware
                  Fault Cryptanalysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {461--472},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190587},
  doi          = {10.1109/TC.2003.1190587},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YenKLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LeeCK03,
  author       = {Jung{-}Yeun Lee and
                  Jung Hee Cheon and
                  Seungjoo Kim},
  editor       = {Marc Joye},
  title        = {An Analysis of Proxy Signatures: Is a Secure Channel Necessary?},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_5},
  doi          = {10.1007/3-540-36563-X\_5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LeeCK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KimMZ03,
  author       = {Seungjoo Kim and
                  Masahiro Mambo and
                  Yuliang Zheng},
  editor       = {Marc Joye},
  title        = {Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_16},
  doi          = {10.1007/3-540-36563-X\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KimMZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/KimKPKW03,
  author       = {Jeeyeon Kim and
                  Hyunjo Kwon and
                  Haeryong Park and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Juan Manuel Cueva Lovelle and
                  Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and
                  Luis Joyanes Aguilar and
                  Jos{\'{e}} Emilio Labra Gayo and
                  Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z},
  title        = {An Improvement of VeriSign's Key Roaming Service Protocol},
  booktitle    = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain,
                  July 14-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2722},
  pages        = {281--288},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45068-8\_53},
  doi          = {10.1007/3-540-45068-8\_53},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/KimKPKW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/YieLKK03,
  author       = {Ikkwon Yie and
                  Seongan Lim and
                  Seungjoo Kim and
                  Dongryeol Kim},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Prime Numbers of Diffie-Hellman Groups for {IKE-MODP}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {228--234},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_17},
  doi          = {10.1007/978-3-540-24582-7\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/YieLKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenKLM01,
  author       = {Sung{-}Ming Yen and
                  Seungjoo Kim and
                  Seongan Lim and
                  Sang{-}Jae Moon},
  editor       = {Kwangjo Kim},
  title        = {{RSA} Speedup with Residue Number System Immune against Hardware Fault
                  Cryptanalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {397--413},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_30},
  doi          = {10.1007/3-540-45861-1\_30},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenKLM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenKLM01a,
  author       = {Sung{-}Ming Yen and
                  Seungjoo Kim and
                  Seongan Lim and
                  Sang{-}Jae Moon},
  editor       = {Kwangjo Kim},
  title        = {A Countermeasure against One Physical Cryptanalysis May Benefit Another
                  Attack},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {414--427},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_31},
  doi          = {10.1007/3-540-45861-1\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenKLM01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KimCJLMWZ01,
  author       = {Seungjoo Kim and
                  Jung Hee Cheon and
                  Marc Joye and
                  Seongan Lim and
                  Masahiro Mambo and
                  Dongho Won and
                  Yuliang Zheng},
  editor       = {Bahram Honary},
  title        = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The
                  Importance of the Order of Decryption and Validation)},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_11},
  doi          = {10.1007/3-540-45325-3\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/KimCJLMWZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LimKYK01,
  author       = {Seongan Lim and
                  Seungjoo Kim and
                  Ikkwon Yie and
                  Jaemoon Kim},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Comments on a Signature Scheme Based on the Third Order {LFSR} Proposed
                  at {ACISP2001}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {308--315},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_29},
  doi          = {10.1007/3-540-45311-3\_29},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LimKYK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LimKYKL01,
  author       = {Seongan Lim and
                  Seungjoo Kim and
                  Ikkwon Yie and
                  Jaemoon Kim and
                  Hongsub Lee},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {{XTR} Extended to GF(p\({}^{\mbox{6m}}\))},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {301--312},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_23},
  doi          = {10.1007/3-540-45537-X\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LimKYKL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/KimKKLPW01,
  author       = {Jeeyeon Kim and
                  Seungjoo Kim and
                  Hyunjo Kwon and
                  Sungjae Lee and
                  Sangjoon Park and
                  Dongho Won},
  title        = {Forward-Secure Commercial Key Escrow Systems},
  booktitle    = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge,
                  MA, {USA}},
  pages        = {211--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ENABL.2001.953416},
  doi          = {10.1109/ENABL.2001.953416},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/KimKKLPW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LimKYL00,
  author       = {Seongan Lim and
                  Seungjoo Kim and
                  Ikkwon Yie and
                  Hongsub Lee},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {A Generalized Takagi-Cryptosystem with a modulus of the form \emph{p\({}^{\mbox{r}}\)q\({}^{\mbox{s}}\)}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {283--294},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_25},
  doi          = {10.1007/3-540-44495-5\_25},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LimKYL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KimLMP99,
  author       = {Seungjoo Kim and
                  Insoo Lee and
                  Masahiro Mambo and
                  Sungjun Park},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {On the Difficulty of Key Recovery Systems},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_18},
  doi          = {10.1007/3-540-47790-X\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KimLMP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JoyeKL99,
  author       = {Marc Joye and
                  Seungjoo Kim and
                  Narn{-}Yih Lee},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {Cryptanalysis of Two Group Signature Schemes},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {271--275},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_23},
  doi          = {10.1007/3-540-47790-X\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JoyeKL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimOW98,
  author       = {Seungjoo Kim and
                  Soohyun Oh and
                  Dongho Won},
  title        = {One-time self-certified public keys, revisited},
  booktitle    = {The 1st International Conference on Information Security and Cryptology,
                  {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings},
  pages        = {59--69},
  publisher    = {Korea Institute of Information Security and Cryptology {(KIISC)}},
  year         = {1998},
  timestamp    = {Fri, 11 Jan 2002 12:38:44 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KimOW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KimPW97,
  author       = {Seungjoo Kim and
                  Sangjoon Park and
                  Dongho Won},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Proxy signatures, Revisited},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {223--232},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028478},
  doi          = {10.1007/BFB0028478},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KimPW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KimPW97,
  author       = {Seungjoo Kim and
                  Sangjoon Park and
                  Dongho Won},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Group Signatures for Hierarchical Multigroups},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {273--281},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030428},
  doi          = {10.1007/BFB0030428},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KimPW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KimPW96,
  author       = {Seungjoo Kim and
                  Sungjun Park and
                  Dongho Won},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Convertible Group Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {311--321},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034857},
  doi          = {10.1007/BFB0034857},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KimPW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics