The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jin Kwak: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:741-748 [Conf]
  2. Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
    RFID System with Fairness Within the Framework of Security and Privacy. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:142-152 [Conf]
  3. Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
    An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:579-590 [Conf]
  4. Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:895-902 [Conf]
  5. Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won
    Security Enhanced WTLS Handshake Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:955-964 [Conf]
  6. Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won
    Security Analysis and Applications of Standard Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:191-200 [Conf]
  7. He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won
    Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:954-963 [Conf]
  8. Soohyun Oh, Jin Kwak, Dongho Won
    An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:737-746 [Conf]
  9. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:924-934 [Conf]
  10. Jin Kwak, Soohyun Oh, Dongho Won
    Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:1009-1016 [Conf]
  11. Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
    Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:70-84 [Conf]
  12. Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
    Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP]
    KES (1), 2007, pp:672-679 [Conf]
  13. Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won
    Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:616-625 [Conf]

  14. Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. [Citation Graph (, )][DBLP]


  15. Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. [Citation Graph (, )][DBLP]


  16. Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. [Citation Graph (, )][DBLP]


  17. A Practical Proxy Device for Protecting RFID Tag's Identifier. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002