|
Search the dblp DataBase
Il-Gon Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:507-510 [Conf]
- Il-Gon Kim, Jin-Young Choi
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:264-269 [Conf]
- Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:979-984 [Conf]
- Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi
Security and Privacy Analysis of RFID Systems Using Model Checking. [Citation Graph (0, 0)][DBLP] HPCC, 2006, pp:495-504 [Conf]
- Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi
Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2005, pp:217-223 [Conf]
- Il-Gon Kim, Jin-Young Choi
New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. [Citation Graph (0, 0)][DBLP] VVEIS, 2004, pp:75-77 [Conf]
- Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
Model-Based Analysis of Money Accountability in Electronic Purses. [Citation Graph (0, 0)][DBLP] WINE, 2005, pp:346-355 [Conf]
- Il-Gon Kim, Debmalya Biswas
Application of Model Checking to AXML System's Security: A Case Study. [Citation Graph (0, 0)][DBLP] WS-FM, 2006, pp:242-256 [Conf]
- Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Choi, Sang-Hun Jeon
Development of Threat Evaluation Tool for Distributed Network Environment. [Citation Graph (0, 0)][DBLP] Computers and Artificial Intelligence, 2005, v:24, n:2, pp:- [Journal]
- Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang
Formal Verification of Security Model Using SPR Tool. [Citation Graph (0, 0)][DBLP] Computers and Artificial Intelligence, 2006, v:25, n:5, pp:- [Journal]
- Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon
Threat Evaluation Method for Distributed Network Environment. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2006, v:22, n:4, pp:889-907 [Journal]
- Il-Gon Kim
Static Verification of Access Control Model for AXML Documents. [Citation Graph (0, 0)][DBLP] APWeb/WAIM, 2007, pp:687-696 [Conf]
Atomicity for P2P based XML Repositories. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|