The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Seungjoo Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:741-748 [Conf]
  2. Seungjoo Kim, Sungjun Park, Dongho Won
    Convertible Group Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:311-321 [Conf]
  3. Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won
    XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:367-373 [Conf]
  4. Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
    Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:227-243 [Conf]
  5. Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim
    An Analysis of Proxy Signatures: Is a Secure Channel Necessary? [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:68-79 [Conf]
  6. Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
    Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:309-323 [Conf]
  7. Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won
    XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2005, pp:316-326 [Conf]
  8. Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
    RFID System with Fairness Within the Framework of Security and Privacy. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:142-152 [Conf]
  9. Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
    An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:579-590 [Conf]
  10. Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang
    A Method for Deciding Quantization Steps in QIM Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:965-975 [Conf]
  11. YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
    A PKI System for Detecting the Exposure of a User's Secret Key. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:248-250 [Conf]
  12. YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won
    A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:215-226 [Conf]
  13. Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won
    XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:323-333 [Conf]
  14. Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang
    Practical and Provably-Secure Multicasting over High-Delay Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:493-501 [Conf]
  15. Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won
    An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:498-507 [Conf]
  16. Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:895-902 [Conf]
  17. Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won
    Two Efficient and Secure Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:858-866 [Conf]
  18. Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
    Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:645-654 [Conf]
  19. Namje Park, Howon Kim, Seungjoo Kim, Dongho Won
    Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1146-1155 [Conf]
  20. He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won
    Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:954-963 [Conf]
  21. Seungjoo Kim, Sangjoon Park, Dongho Won
    Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:223-232 [Conf]
  22. Seungjoo Kim, Soohyun Oh, Dongho Won
    One-time self-certified public keys, revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:59-69 [Conf]
  23. Seungjoo Kim, Dongho Won
    Threshold Entrusted Undeniable Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:195-203 [Conf]
  24. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:397-413 [Conf]
  25. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:414-427 [Conf]
  26. Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won
    An Improvement of VeriSign's Key Roaming Service Protocol. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:281-288 [Conf]
  27. Namje Park, Seungjoo Kim, Dongho Won, Howon Kim
    Security Analysis and Implementation Leveraging Globally Networked RFIDs. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:494-505 [Conf]
  28. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  29. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim
    Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:308-315 [Conf]
  30. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee
    A Generalized Takagi-Cryptosystem with a modulus of the form prqs. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:283-294 [Conf]
  31. Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim
    Prime Numbers of Diffie-Hellman Groups for IKE-MODP. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:228-234 [Conf]
  32. Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won
    Group Key Agreement Protocol Among Mobile Devices in Different Cells. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:1090-1097 [Conf]
  33. Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park
    On the Difficulty of Key Recovery Systems. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:207-224 [Conf]
  34. Seungjoo Kim, Sangjoon Park, Dongho Won
    Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:273-281 [Conf]
  35. Marc Joye, Seungjoo Kim, Narn-Yih Lee
    Cryptanalysis of Two Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:271-275 [Conf]
  36. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:924-934 [Conf]
  37. Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won
    An Efficient Dispute Resolving Method for Digital Images. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:331-341 [Conf]
  38. Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:117-128 [Conf]
  39. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee
    XTR Extended to GF(p6m). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:301-312 [Conf]
  40. Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
    Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:70-84 [Conf]
  41. Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:90-99 [Conf]
  42. Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won
    Forward-Secure Commercial Key Escrow Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:211-216 [Conf]
  43. Junghyun Nam, Seungjoo Kim, Dongho Won
    Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:1-9 [Conf]
  44. Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, Seonhee Yoon
    Differential and linear cryptanalysis for 2-round SPNs. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:87, n:5, pp:277-282 [Journal]
  45. Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won
    Security weakness in a three-party pairing-based protocol for password authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1364-1375 [Journal]
  46. Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
    DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
  47. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal]
  48. Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won
    An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:135-145 [Conf]
  49. Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won
    Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:547-552 [Conf]
  50. YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
    A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:1007-1016 [Conf]

  51. Cipher Suite Setting Problem of SSL Protocol and it's Solutions. [Citation Graph (, )][DBLP]


  52. Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. [Citation Graph (, )][DBLP]


  53. A Practical Approach to a Reliable Electronic Election. [Citation Graph (, )][DBLP]


  54. Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  55. Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. [Citation Graph (, )][DBLP]


  56. A Study on Comparative Analysis of the Information Security Management Systems. [Citation Graph (, )][DBLP]


  57. Security Specification for Conversion Technologies of Heterogeneous DRM Systems. [Citation Graph (, )][DBLP]


  58. Protection Profile for Secure E-Voting Systems. [Citation Graph (, )][DBLP]


  59. A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . [Citation Graph (, )][DBLP]


  60. Protection Profile for Connected Interoperable DRM Framework. [Citation Graph (, )][DBLP]


  61. Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. [Citation Graph (, )][DBLP]


  62. The Vulnerabilities Analysis of Fuzzy Vault Using Password. [Citation Graph (, )][DBLP]


  63. Enforcing security in mobile RFID networks multilateral approaches and solutions. [Citation Graph (, )][DBLP]


  64. Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. [Citation Graph (, )][DBLP]


  65. Automated DCI compliance test system for Digital Cinema Entities. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.460secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002