|
Search the dblp DataBase
Dongho Won:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP] APWeb Workshops, 2006, pp:741-748 [Conf]
- Seungjoo Kim, Sungjun Park, Dongho Won
Convertible Group Signatures. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:311-321 [Conf]
- Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won
XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP] AWIC, 2005, pp:367-373 [Conf]
- Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won
On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:260-266 [Conf]
- In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won
A Study on Security Risk Modeling over Information and Communication Infrastructure. [Citation Graph (0, 0)][DBLP] Security and Management, 2004, pp:249-253 [Conf]
- Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:309-323 [Conf]
- Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. [Citation Graph (0, 0)][DBLP] EC-Web, 2005, pp:316-326 [Conf]
- Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
RFID System with Fairness Within the Framework of Security and Privacy. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:142-152 [Conf]
- Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:579-590 [Conf]
- Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang
A Method for Deciding Quantization Steps in QIM Watermarking Schemes. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:965-975 [Conf]
- Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:223-232 [Conf]
- YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
A PKI System for Detecting the Exposure of a User's Secret Key. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:248-250 [Conf]
- YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:215-226 [Conf]
- Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. [Citation Graph (0, 0)][DBLP] GCC, 2005, pp:323-333 [Conf]
- Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang
Practical and Provably-Secure Multicasting over High-Delay Networks. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (2), 2005, pp:493-501 [Conf]
- Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:498-507 [Conf]
- Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2006, pp:777-786 [Conf]
- In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:54-63 [Conf]
- In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:92-101 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:895-902 [Conf]
- Youngsoo Kim, Taekyong Nam, Dongho Won
2-Way Text Classification for Harmful Web Documents. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:545-551 [Conf]
- Hyuk Jin Ko, Dongho Won, Dong Ryul Shin, Hyunseung Choo, Ung-Mo Kim
A Semantic Context-Aware Access Control in Pervasive Environments. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:165-174 [Conf]
- Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won
Security Enhanced WTLS Handshake Protocol. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2004, pp:955-964 [Conf]
- Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won
Two Efficient and Secure Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:858-866 [Conf]
- Youngsook Lee, Junghyun Nam, Dongho Won
An Inter-domain Key Agreement Protocol Using Weak Passwords. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:517-526 [Conf]
- Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won
Security Analysis and Applications of Standard Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2003, pp:191-200 [Conf]
- Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:645-654 [Conf]
- Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:251-259 [Conf]
- Namje Park, Howon Kim, Seungjoo Kim, Dongho Won
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:1146-1155 [Conf]
- Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn, Dongho Won
Implementation of Streamlining PKI System for Web Services. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:609-618 [Conf]
- He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:954-963 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:223-232 [Conf]
- Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:217-222 [Conf]
- Seungjoo Kim, Soohyun Oh, Dongho Won
One-time self-certified public keys, revisited. [Citation Graph (0, 0)][DBLP] ICISC, 1998, pp:59-69 [Conf]
- Seungjoo Kim, Dongho Won
Threshold Entrusted Undeniable Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:195-203 [Conf]
- Dug-Hwan Choi, Seungbok Choi, Dongho Won
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:72-80 [Conf]
- Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:221-234 [Conf]
- Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. [Citation Graph (0, 0)][DBLP] ICISC, 1999, pp:147-155 [Conf]
- Soohyun Oh, Jin Kwak, Dongho Won
An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. [Citation Graph (0, 0)][DBLP] ICOIN, 2003, pp:737-746 [Conf]
- Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won
An Improvement of VeriSign's Key Roaming Service Protocol. [Citation Graph (0, 0)][DBLP] ICWE, 2003, pp:281-288 [Conf]
- Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. [Citation Graph (0, 0)][DBLP] ICWE, 2005, pp:191-196 [Conf]
- Juryon Paik, Dongho Won, Farshad Fotouhi, Ung-Mo Kim
EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. [Citation Graph (0, 0)][DBLP] IDEAL, 2005, pp:1-8 [Conf]
- Namje Park, Seungjoo Kim, Dongho Won, Howon Kim
Security Analysis and Implementation Leveraging Globally Networked RFIDs. [Citation Graph (0, 0)][DBLP] PWC, 2006, pp:494-505 [Conf]
- Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:114-127 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won
Group Key Agreement Protocol Among Mobile Devices in Different Cells. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2006, pp:1090-1097 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:273-281 [Conf]
- Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP] KES (1), 2006, pp:924-934 [Conf]
- Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won
An Efficient Dispute Resolving Method for Digital Images. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:331-341 [Conf]
- Youngsook Lee, Junghyun Nam, Dongho Won
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:508-516 [Conf]
- Jin Kwak, Soohyun Oh, Dongho Won
Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. [Citation Graph (0, 0)][DBLP] PARA, 2004, pp:1009-1016 [Conf]
- Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. [Citation Graph (0, 0)][DBLP] PCM (2), 2005, pp:117-128 [Conf]
- Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP] SPC, 2005, pp:70-84 [Conf]
- Junghyun Nam, Seungjoo Kim, Dongho Won
Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:90-99 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won
Forward-Secure Commercial Key Escrow Systems. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:211-216 [Conf]
- Junghyun Nam, Seungjoo Kim, Dongho Won
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:1-9 [Conf]
- Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:6, pp:1364-1375 [Journal]
- Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
- Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:158-176 [Conf]
- Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:135-145 [Conf]
- Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. [Citation Graph (0, 0)][DBLP] HCI (5), 2007, pp:547-552 [Conf]
- Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:996-1007 [Conf]
- Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP] KES (1), 2007, pp:672-679 [Conf]
- Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. [Citation Graph (0, 0)][DBLP] KES-AMSTA, 2007, pp:616-625 [Conf]
- YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. [Citation Graph (0, 0)][DBLP] KES-AMSTA, 2007, pp:1007-1016 [Conf]
- Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]
Cipher Suite Setting Problem of SSL Protocol and it's Solutions. [Citation Graph (, )][DBLP]
Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. [Citation Graph (, )][DBLP]
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. [Citation Graph (, )][DBLP]
Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. [Citation Graph (, )][DBLP]
Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. [Citation Graph (, )][DBLP]
A Practical Approach to a Reliable Electronic Election. [Citation Graph (, )][DBLP]
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. [Citation Graph (, )][DBLP]
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. [Citation Graph (, )][DBLP]
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. [Citation Graph (, )][DBLP]
A Study on Comparative Analysis of the Information Security Management Systems. [Citation Graph (, )][DBLP]
Security Specification for Conversion Technologies of Heterogeneous DRM Systems. [Citation Graph (, )][DBLP]
Protection Profile for Secure E-Voting Systems. [Citation Graph (, )][DBLP]
A Trustworthy ID Management Mechanism in Open Market. [Citation Graph (, )][DBLP]
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . [Citation Graph (, )][DBLP]
Enhancing of a Password-Based Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]
Protection Profile for Connected Interoperable DRM Framework. [Citation Graph (, )][DBLP]
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. [Citation Graph (, )][DBLP]
The Vulnerabilities Analysis of Fuzzy Vault Using Password. [Citation Graph (, )][DBLP]
Enforcing security in mobile RFID networks multilateral approaches and solutions. [Citation Graph (, )][DBLP]
Policy and role based mobile RFID user privacy data management system. [Citation Graph (, )][DBLP]
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. [Citation Graph (, )][DBLP]
Automated DCI compliance test system for Digital Cinema Entities. [Citation Graph (, )][DBLP]
Search in 0.020secs, Finished in 0.023secs
|