Остановите войну!
for scientists:
default search action
Dongho Won
- > Home > Persons > Dongho Won
Publications
- 2022
- [j66]Jihyeon Ryu, Dongwoo Kang, Dongho Won:
Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme. IEEE Access 10: 15891-15910 (2022) - [c175]Dongwoo Kang, Hoil Ryu, Dongho Won:
Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems. IMCOM 2022: 1-4 - 2021
- [j64]Hakjun Lee, Dongwoo Kang, Youngsook Lee, Dongho Won:
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment. Wirel. Commun. Mob. Comput. 2021: 2098530:1-2098530:20 (2021) - [c172]Hoil Ryu, Dongwoo Kang, Dongho Won:
On a Partially Verifiable Multi-party Multi-argument Zero-knowledge Proof. IMCOM 2021: 1-8 - 2020
- [j63]Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. J. Inf. Secur. Appl. 52: 102494 (2020) - [j62]Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, Dongho Won:
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors 20(24): 7136 (2020) - [c170]Dongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee:
Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem. IMCOM 2020: 1-8 - 2018
- [j61]Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Secur. Commun. Networks 2018: 9046064:1-9046064:14 (2018) - [c168]Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, Dongho Won:
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks. ICCSA (2) 2018: 50-61 - [c165]Chunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme. ICOIN 2018: 438-441 - 2017
- [j57]Donghoon Lee, Dongwoo Kang, Jiye Kim, Dongho Won:
Software Birthmark Method Using Combined Structure-Based and API-Based. J. Softw. 12(2): 138-144 (2017) - [c162]Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won:
Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards. AHFE (9) 2017: 62-71 - [c160]Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won:
Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. AHFE (9) 2017: 78-84 - [c159]Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won:
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks. ICDIM 2017: 139-143 - [c157]Dongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, Dongho Won:
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems. IMCOM 2017: 18 - 2016
- [j52]Donghoon Lee, Dongwoo Kang, Younsung Choi, Jiye Kim, Dongho Won:
API-Based Software Birthmarking Method Using Fuzzy Hashing. IEICE Trans. Inf. Syst. 99-D(7): 1836-1851 (2016) - [j45]Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, Dongho Won:
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Networks 9(11): 1462-1476 (2016) - [c153]Dongwoo Kang, Jongho Moon, Donghoon Lee, Dongho Won:
Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment. ICCSA (5) 2016: 87-99 - [c150]Jaewook Jung, Donghoon Lee, Jiye Kim, Youngsook Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. IMCOM 2016: 23:1-23:8 - 2015
- [c146]Dongwoo Kang, Jongho Mun, Donghoon Lee, Dongho Won:
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices. CSA/CUTE 2015: 309-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint