The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dongho Won: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:741-748 [Conf]
  2. Seungjoo Kim, Sungjun Park, Dongho Won
    Convertible Group Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:311-321 [Conf]
  3. Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won
    XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:367-373 [Conf]
  4. Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won
    On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:260-266 [Conf]
  5. In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won
    A Study on Security Risk Modeling over Information and Communication Infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:249-253 [Conf]
  6. Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
    Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:309-323 [Conf]
  7. Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won
    XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2005, pp:316-326 [Conf]
  8. Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
    RFID System with Fairness Within the Framework of Security and Privacy. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:142-152 [Conf]
  9. Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
    An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:579-590 [Conf]
  10. Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang
    A Method for Deciding Quantization Steps in QIM Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:965-975 [Conf]
  11. Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won
    An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:223-232 [Conf]
  12. YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
    A PKI System for Detecting the Exposure of a User's Secret Key. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:248-250 [Conf]
  13. YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won
    A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:215-226 [Conf]
  14. Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won
    XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:323-333 [Conf]
  15. Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang
    Practical and Provably-Secure Multicasting over High-Delay Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:493-501 [Conf]
  16. Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won
    An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:498-507 [Conf]
  17. Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won
    Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:777-786 [Conf]
  18. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won
    Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:54-63 [Conf]
  19. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won
    A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:92-101 [Conf]
  20. Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:895-902 [Conf]
  21. Youngsoo Kim, Taekyong Nam, Dongho Won
    2-Way Text Classification for Harmful Web Documents. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:545-551 [Conf]
  22. Hyuk Jin Ko, Dongho Won, Dong Ryul Shin, Hyunseung Choo, Ung-Mo Kim
    A Semantic Context-Aware Access Control in Pervasive Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:165-174 [Conf]
  23. Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won
    Security Enhanced WTLS Handshake Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:955-964 [Conf]
  24. Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won
    Two Efficient and Secure Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:858-866 [Conf]
  25. Youngsook Lee, Junghyun Nam, Dongho Won
    An Inter-domain Key Agreement Protocol Using Weak Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:517-526 [Conf]
  26. Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won
    Security Analysis and Applications of Standard Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:191-200 [Conf]
  27. Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
    Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:645-654 [Conf]
  28. Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won
    XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:251-259 [Conf]
  29. Namje Park, Howon Kim, Seungjoo Kim, Dongho Won
    Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1146-1155 [Conf]
  30. Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn, Dongho Won
    Implementation of Streamlining PKI System for Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:609-618 [Conf]
  31. He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won
    Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:954-963 [Conf]
  32. Seungjoo Kim, Sangjoon Park, Dongho Won
    Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:223-232 [Conf]
  33. Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
    Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:217-222 [Conf]
  34. Seungjoo Kim, Soohyun Oh, Dongho Won
    One-time self-certified public keys, revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:59-69 [Conf]
  35. Seungjoo Kim, Dongho Won
    Threshold Entrusted Undeniable Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:195-203 [Conf]
  36. Dug-Hwan Choi, Seungbok Choi, Dongho Won
    Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:72-80 [Conf]
  37. Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won
    Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:221-234 [Conf]
  38. Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang
    Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:147-155 [Conf]
  39. Soohyun Oh, Jin Kwak, Dongho Won
    An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:737-746 [Conf]
  40. Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won
    An Improvement of VeriSign's Key Roaming Service Protocol. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:281-288 [Conf]
  41. Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng
    A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:191-196 [Conf]
  42. Juryon Paik, Dongho Won, Farshad Fotouhi, Ung-Mo Kim
    EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2005, pp:1-8 [Conf]
  43. Namje Park, Seungjoo Kim, Dongho Won, Howon Kim
    Security Analysis and Implementation Leveraging Globally Networked RFIDs. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:494-505 [Conf]
  44. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  45. Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won
    Group Key Agreement Protocol Among Mobile Devices in Different Cells. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:1090-1097 [Conf]
  46. Seungjoo Kim, Sangjoon Park, Dongho Won
    Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:273-281 [Conf]
  47. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:924-934 [Conf]
  48. Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won
    An Efficient Dispute Resolving Method for Digital Images. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:331-341 [Conf]
  49. Youngsook Lee, Junghyun Nam, Dongho Won
    Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:508-516 [Conf]
  50. Jin Kwak, Soohyun Oh, Dongho Won
    Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:1009-1016 [Conf]
  51. Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:117-128 [Conf]
  52. Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
    Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:70-84 [Conf]
  53. Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:90-99 [Conf]
  54. Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won
    Forward-Secure Commercial Key Escrow Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:211-216 [Conf]
  55. Junghyun Nam, Seungjoo Kim, Dongho Won
    Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:1-9 [Conf]
  56. Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won
    Security weakness in a three-party pairing-based protocol for password authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1364-1375 [Journal]
  57. Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
    DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
  58. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:158-176 [Conf]
  59. Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won
    An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:135-145 [Conf]
  60. Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won
    Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:547-552 [Conf]
  61. Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won
    Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:996-1007 [Conf]
  62. Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
    Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP]
    KES (1), 2007, pp:672-679 [Conf]
  63. Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won
    Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:616-625 [Conf]
  64. YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won
    A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:1007-1016 [Conf]
  65. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]

  66. Cipher Suite Setting Problem of SSL Protocol and it's Solutions. [Citation Graph (, )][DBLP]


  67. Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. [Citation Graph (, )][DBLP]


  68. Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. [Citation Graph (, )][DBLP]


  69. Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. [Citation Graph (, )][DBLP]


  70. Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. [Citation Graph (, )][DBLP]


  71. A Practical Approach to a Reliable Electronic Election. [Citation Graph (, )][DBLP]


  72. Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. [Citation Graph (, )][DBLP]


  73. Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  74. Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. [Citation Graph (, )][DBLP]


  75. A Study on Comparative Analysis of the Information Security Management Systems. [Citation Graph (, )][DBLP]


  76. Security Specification for Conversion Technologies of Heterogeneous DRM Systems. [Citation Graph (, )][DBLP]


  77. Protection Profile for Secure E-Voting Systems. [Citation Graph (, )][DBLP]


  78. A Trustworthy ID Management Mechanism in Open Market. [Citation Graph (, )][DBLP]


  79. Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  80. A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . [Citation Graph (, )][DBLP]


  81. Enhancing of a Password-Based Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  82. Protection Profile for Connected Interoperable DRM Framework. [Citation Graph (, )][DBLP]


  83. Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  84. Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. [Citation Graph (, )][DBLP]


  85. The Vulnerabilities Analysis of Fuzzy Vault Using Password. [Citation Graph (, )][DBLP]


  86. Enforcing security in mobile RFID networks multilateral approaches and solutions. [Citation Graph (, )][DBLP]


  87. Policy and role based mobile RFID user privacy data management system. [Citation Graph (, )][DBLP]


  88. Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. [Citation Graph (, )][DBLP]


  89. Automated DCI compliance test system for Digital Cinema Entities. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.612secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002