The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Il-Gon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
    Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:507-510 [Conf]
  2. Il-Gon Kim, Jin-Young Choi
    Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:264-269 [Conf]
  3. Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
    Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:979-984 [Conf]
  4. Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi
    Security and Privacy Analysis of RFID Systems Using Model Checking. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:495-504 [Conf]
  5. Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi
    Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:217-223 [Conf]
  6. Il-Gon Kim, Jin-Young Choi
    New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. [Citation Graph (0, 0)][DBLP]
    VVEIS, 2004, pp:75-77 [Conf]
  7. Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
    Model-Based Analysis of Money Accountability in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:346-355 [Conf]
  8. Il-Gon Kim, Debmalya Biswas
    Application of Model Checking to AXML System's Security: A Case Study. [Citation Graph (0, 0)][DBLP]
    WS-FM, 2006, pp:242-256 [Conf]
  9. Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Choi, Sang-Hun Jeon
    Development of Threat Evaluation Tool for Distributed Network Environment. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2005, v:24, n:2, pp:- [Journal]
  10. Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang
    Formal Verification of Security Model Using SPR Tool. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2006, v:25, n:5, pp:- [Journal]
  11. Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon
    Threat Evaluation Method for Distributed Network Environment. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:4, pp:889-907 [Journal]
  12. Il-Gon Kim
    Static Verification of Access Control Model for AXML Documents. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM, 2007, pp:687-696 [Conf]

  13. Atomicity for P2P based XML Repositories. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002