Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Kim-Kwang Raymond Choo
2010 – today
- 2013
[j23]Kim-Kwang Raymond Choo: New payment methods: A review of 2010-2012 FATF mutual evaluation reports. Computers & Security 36: 12-26 (2013)
[j22]Darren Quick, Kim-Kwang Raymond Choo: Dropbox analysis: Data remnants on user machines. Digital Investigation 10(1): 3-18 (2013)
[j21]Darren Quick, Kim-Kwang Raymond Choo: Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Comp. Syst. 29(6): 1378-1394 (2013)
[i11]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won: On the security of a password-only authenticated three-party key exchange protocol. IACR Cryptology ePrint Archive 2013: 540 (2013)- 2012
[j20]Ben Martini, Kim-Kwang Raymond Choo: An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 9(2): 71-80 (2012)
[j19]Kim-Kwang Raymond Choo: Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop. SIGACT News 43(2): 38-40 (2012)- 2011
[j18]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo: An ID-based digital watermarking protocol for copyright protection. Computers & Electrical Engineering 37(4): 526-531 (2011)
[j17]Kim-Kwang Raymond Choo: The cyber threat landscape: Challenges and future research directions. Computers & Security 30(8): 719-731 (2011)- 2010
[j16]Kim-Kwang Raymond Choo: High tech criminal threats to the national information infrastructure. Inf. Sec. Techn. Report 15(3): 104-111 (2010)
[j15]Peng Zeng, Kim-Kwang Raymond Choo, Da-Zhi Sun: On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Trans. Consumer Electronics 56(2): 566-569 (2010)
[c17]Joseph Chee Ming Teo, Kim-Kwang Raymond Choo: Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks. ITNG 2010: 732-737
2000 – 2009
- 2009
[b1]Kim-Kwang Raymond Choo: Secure Key Establishment. Advances in Information Security 41, Springer 2009, ISBN 978-0-387-87968-0, pp. 1-210
[j14]Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo: Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science in China Series F: Information Sciences 52(8): 1358-1370 (2009)
[j13]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang: On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters 13(3): 170-171 (2009)
[j12]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang: Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Communications Letters 13(6): 426-428 (2009)
[j11]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3): 307-318 (2009)- 2008
[j10]Kim-Kwang Raymond Choo: Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. Comput. J. 51(6): 744 (2008)
[j9]Kim-Kwang Raymond Choo: Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols. I. J. Network Security 7(1): 15-23 (2008)
[i10]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang: Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol. IACR Cryptology ePrint Archive 2008: 1 (2008)- 2007
[j8]Kim-Kwang Raymond Choo: A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. Comput. J. 50(5): 591-601 (2007)
[j7]Kim-Kwang Raymond Choo: An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker. Informatica, Lith. Acad. Sci. 18(4): 547-568 (2007)
[c16]Sherman S. M. Chow, Kim-Kwang Raymond Choo: Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ISC 2007: 203-220
[c15]Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng: Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. ProvSec 2007: 169-177
[c14]Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo: Secret Signatures: How to Achieve Business Privacy Efficiently? WISA 2007: 30-47
[i9]Sherman S. M. Chow, Kim-Kwang Raymond Choo: Strongly-Secure Identity-based Key Agreement and Anonymous Extension. IACR Cryptology ePrint Archive 2007: 18 (2007)
[i8]Kim-Kwang Raymond Choo: A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. IACR Cryptology ePrint Archive 2007: 188 (2007)
[i7]Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo: Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode. IACR Cryptology ePrint Archive 2007: 313 (2007)- 2006
[j6]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29(15): 2788-2797 (2006)
[j5]Kim-Kwang Raymond Choo: Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol. I. J. Network Security 2(1): 64-68 (2006)
[j4]Kim-Kwang Raymond Choo: On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol. I. J. Network Security 3(1): 85-94 (2006)
[j3]Kim-Kwang Raymond Choo: Issue report on business adoption of Microsoft Passport. Inf. Manag. Comput. Security 14(3): 218-234 (2006)
[j2]Kim-Kwang Raymond Choo: On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. Informatica, Lith. Acad. Sci. 17(4): 467-480 (2006)
[c13]Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria: An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382
[c12]Qiang Tang, Kim-Kwang Raymond Choo: Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. ACNS 2006: 162-177
[c11]Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo: Formal analysis of secure contracting protocol for e-tendering. ACSW Frontiers 2006: 155-164
[c10]Kim-Kwang Raymond Choo: Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. CSFW 2006: 297-308
[i6]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo: New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles). IACR Cryptology ePrint Archive 2006: 446 (2006)- 2005
[j1]Kim-Kwang Raymond Choo: Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols. I. J. Network Security 1(3): 154-160 (2005)
[c9]Kim-Kwang Raymond Choo, Yvonne Hitchcock: Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. ACISP 2005: 429-442
[c8]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005: 585-604
[c7]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Errors in Computational Complexity Proofs for Protocols. ASIACRYPT 2005: 624-643
[c6]Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi: A Secure Anonymous Authorisation Architecture for E-Commerce. EEE 2005: 106-111
[c5]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: On Session Key Construction in Provably-Secure Key Establishment Protocols. Mycrypt 2005: 116-131
[c4]Colin Boyd, Kim-Kwang Raymond Choo: Security of Two-Party Identity-Based Key Agreement. Mycrypt 2005: 229-243
[i5]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols. IACR Cryptology ePrint Archive 2005: 206 (2005)
[i4]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. IACR Cryptology ePrint Archive 2005: 270 (2005)
[i3]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Errors in Computational Complexity Proofs for Protocols. IACR Cryptology ePrint Archive 2005: 351 (2005)- 2004
[c3]Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi: A user-centric anonymous authorisation framework in e-commerce environment. ICEC 2004: 138-147
[c2]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: Complementing Computational Protocol Analysis with Formal Specifications. Formal Aspects in Security and Trust 2004: 129-144
[c1]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. SCN 2004: 351-366
[i2]Kim-Kwang Raymond Choo: Revisit Of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. IACR Cryptology ePrint Archive 2004: 343 (2004)
[i1]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. IACR Cryptology ePrint Archive 2004: 345 (2004)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:10 CEST by the dblp team



