|
Search the dblp DataBase
Junghyun Nam:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:309-323 [Conf]
- Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang
Practical and Provably-Secure Multicasting over High-Delay Networks. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (2), 2005, pp:493-501 [Conf]
- Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:498-507 [Conf]
- Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won
Two Efficient and Secure Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:858-866 [Conf]
- Youngsook Lee, Junghyun Nam, Dongho Won
An Inter-domain Key Agreement Protocol Using Weak Passwords. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:517-526 [Conf]
- Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:645-654 [Conf]
- Youngsook Lee, Junghyun Nam, Dongho Won
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:508-516 [Conf]
- Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. [Citation Graph (0, 0)][DBLP] PCM (2), 2005, pp:117-128 [Conf]
- Junghyun Nam, Seungjoo Kim, Dongho Won
Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:90-99 [Conf]
- Junghyun Nam, Seungjoo Kim, Dongho Won
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:1-9 [Conf]
- Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:6, pp:1364-1375 [Journal]
- Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
- Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:158-176 [Conf]
- Juryon Paik, Junghyun Nam, SeungCheol Lee, Ung-Mo Kim
A Framework for Data Structure-Guided Extraction of XML Association Rules. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2007, pp:709-716 [Conf]
- Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP] KES (1), 2007, pp:672-679 [Conf]
- Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. [Citation Graph (0, 0)][DBLP] KES-AMSTA, 2007, pp:616-625 [Conf]
- Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]
Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP]
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. [Citation Graph (, )][DBLP]
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]
Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP]
Search in 0.035secs, Finished in 0.037secs
|