The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Junghyun Nam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
    Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:309-323 [Conf]
  2. Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang
    Practical and Provably-Secure Multicasting over High-Delay Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:493-501 [Conf]
  3. Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won
    An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:498-507 [Conf]
  4. Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won
    Two Efficient and Secure Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:858-866 [Conf]
  5. Youngsook Lee, Junghyun Nam, Dongho Won
    An Inter-domain Key Agreement Protocol Using Weak Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:517-526 [Conf]
  6. Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
    Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:645-654 [Conf]
  7. Youngsook Lee, Junghyun Nam, Dongho Won
    Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:508-516 [Conf]
  8. Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:117-128 [Conf]
  9. Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:90-99 [Conf]
  10. Junghyun Nam, Seungjoo Kim, Dongho Won
    Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:1-9 [Conf]
  11. Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won
    Security weakness in a three-party pairing-based protocol for password authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1364-1375 [Journal]
  12. Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
    DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
  13. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:158-176 [Conf]
  14. Juryon Paik, Junghyun Nam, SeungCheol Lee, Ung-Mo Kim
    A Framework for Data Structure-Guided Extraction of XML Association Rules. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:709-716 [Conf]
  15. Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
    Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP]
    KES (1), 2007, pp:672-679 [Conf]
  16. Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won
    Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:616-625 [Conf]
  17. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]

  18. Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  19. Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP]


  20. Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  21. Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. [Citation Graph (, )][DBLP]


  22. Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  23. Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.153secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002