|
Search the dblp DataBase
Seungjoo Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP] APWeb Workshops, 2006, pp:741-748 [Conf]
- Seungjoo Kim, Sungjun Park, Dongho Won
Convertible Group Signatures. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:311-321 [Conf]
- Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won
XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP] AWIC, 2005, pp:367-373 [Conf]
- Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:227-243 [Conf]
- Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim
An Analysis of Proxy Signatures: Is a Secure Channel Necessary? [Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:68-79 [Conf]
- Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:309-323 [Conf]
- Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. [Citation Graph (0, 0)][DBLP] EC-Web, 2005, pp:316-326 [Conf]
- Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
RFID System with Fairness Within the Framework of Security and Privacy. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:142-152 [Conf]
- Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:579-590 [Conf]
- Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang
A Method for Deciding Quantization Steps in QIM Watermarking Schemes. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:965-975 [Conf]
- YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
A PKI System for Detecting the Exposure of a User's Secret Key. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:248-250 [Conf]
- YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:215-226 [Conf]
- Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. [Citation Graph (0, 0)][DBLP] GCC, 2005, pp:323-333 [Conf]
- Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang
Practical and Provably-Secure Multicasting over High-Delay Networks. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (2), 2005, pp:493-501 [Conf]
- Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:498-507 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:895-902 [Conf]
- Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won
Two Efficient and Secure Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:858-866 [Conf]
- Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:645-654 [Conf]
- Namje Park, Howon Kim, Seungjoo Kim, Dongho Won
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:1146-1155 [Conf]
- He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:954-963 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:223-232 [Conf]
- Seungjoo Kim, Soohyun Oh, Dongho Won
One-time self-certified public keys, revisited. [Citation Graph (0, 0)][DBLP] ICISC, 1998, pp:59-69 [Conf]
- Seungjoo Kim, Dongho Won
Threshold Entrusted Undeniable Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:195-203 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:397-413 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:414-427 [Conf]
- Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won
An Improvement of VeriSign's Key Roaming Service Protocol. [Citation Graph (0, 0)][DBLP] ICWE, 2003, pp:281-288 [Conf]
- Namje Park, Seungjoo Kim, Dongho Won, Howon Kim
Security Analysis and Implementation Leveraging Globally Networked RFIDs. [Citation Graph (0, 0)][DBLP] PWC, 2006, pp:494-505 [Conf]
- Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:114-127 [Conf]
- Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:308-315 [Conf]
- Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee
A Generalized Takagi-Cryptosystem with a modulus of the form prqs. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:283-294 [Conf]
- Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim
Prime Numbers of Diffie-Hellman Groups for IKE-MODP. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:228-234 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won
Group Key Agreement Protocol Among Mobile Devices in Different Cells. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2006, pp:1090-1097 [Conf]
- Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park
On the Difficulty of Key Recovery Systems. [Citation Graph (0, 0)][DBLP] ISW, 1999, pp:207-224 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:273-281 [Conf]
- Marc Joye, Seungjoo Kim, Narn-Yih Lee
Cryptanalysis of Two Group Signature Schemes. [Citation Graph (0, 0)][DBLP] ISW, 1999, pp:271-275 [Conf]
- Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP] KES (1), 2006, pp:924-934 [Conf]
- Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won
An Efficient Dispute Resolving Method for Digital Images. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:331-341 [Conf]
- Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. [Citation Graph (0, 0)][DBLP] PCM (2), 2005, pp:117-128 [Conf]
- Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee
XTR Extended to GF(p6m). [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:301-312 [Conf]
- Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP] SPC, 2005, pp:70-84 [Conf]
- Junghyun Nam, Seungjoo Kim, Dongho Won
Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:90-99 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won
Forward-Secure Commercial Key Escrow Systems. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:211-216 [Conf]
- Junghyun Nam, Seungjoo Kim, Dongho Won
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:1-9 [Conf]
- Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, Seonhee Yoon
Differential and linear cryptanalysis for 2-round SPNs. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2003, v:87, n:5, pp:277-282 [Journal]
- Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:6, pp:1364-1375 [Journal]
- Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal]
- Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:135-145 [Conf]
- Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. [Citation Graph (0, 0)][DBLP] HCI (5), 2007, pp:547-552 [Conf]
- YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. [Citation Graph (0, 0)][DBLP] KES-AMSTA, 2007, pp:1007-1016 [Conf]
Cipher Suite Setting Problem of SSL Protocol and it's Solutions. [Citation Graph (, )][DBLP]
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. [Citation Graph (, )][DBLP]
A Practical Approach to a Reliable Electronic Election. [Citation Graph (, )][DBLP]
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. [Citation Graph (, )][DBLP]
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. [Citation Graph (, )][DBLP]
A Study on Comparative Analysis of the Information Security Management Systems. [Citation Graph (, )][DBLP]
Security Specification for Conversion Technologies of Heterogeneous DRM Systems. [Citation Graph (, )][DBLP]
Protection Profile for Secure E-Voting Systems. [Citation Graph (, )][DBLP]
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . [Citation Graph (, )][DBLP]
Protection Profile for Connected Interoperable DRM Framework. [Citation Graph (, )][DBLP]
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. [Citation Graph (, )][DBLP]
The Vulnerabilities Analysis of Fuzzy Vault Using Password. [Citation Graph (, )][DBLP]
Enforcing security in mobile RFID networks multilateral approaches and solutions. [Citation Graph (, )][DBLP]
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. [Citation Graph (, )][DBLP]
Automated DCI compliance test system for Digital Cinema Entities. [Citation Graph (, )][DBLP]
Search in 0.046secs, Finished in 0.050secs
|