


default search action
Dongho Won
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j70]Hakjun Lee
, Jihyeon Ryu
, Dongho Won
:
Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments. IEEE Internet Things J. 11(4): 5798-5815 (2024) - [j69]Sangjin Kook, Keunok Kim
, Jihyeon Ryu, Youngsook Lee, Dongho Won:
Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors 24(10): 3085 (2024) - [j68]Jihyeon Ryu, Yifeng Zheng
, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024) - 2023
- [j67]Keunok Kim
, Jihyeon Ryu
, Youngsook Lee, Dongho Won:
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things. Sensors 23(3): 1122 (2023) - [c176]Jihyeon Ryu, Keunok Kim, Dongho Won:
A Study on Partially Homomorphic Encryption. IMCOM 2023: 1-4 - 2022
- [j66]Jihyeon Ryu
, Dongwoo Kang, Dongho Won
:
Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme. IEEE Access 10: 15891-15910 (2022) - [j65]Jihyeon Ryu
, Hakjun Lee
, Youngsook Lee
, Dongho Won
:
SMASG: Secure Mobile Authentication Scheme for Global Mobility Network. IEEE Access 10: 26907-26919 (2022) - [c175]Dongwoo Kang, Hoil Ryu, Dongho Won:
Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems. IMCOM 2022: 1-4 - [c174]Jihyeon Ryu, Dongho Won, Youngsook Lee:
A Study of Split Learning Model. IMCOM 2022: 1-4 - 2021
- [j64]Hakjun Lee
, Dongwoo Kang
, Youngsook Lee
, Dongho Won
:
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment. Wirel. Commun. Mob. Comput. 2021: 2098530:1-2098530:20 (2021) - [c173]Hakjun Lee, Jihyeon Ryu, Youngsook Lee, Dongho Won:
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure. IMCOM 2021: 1-4 - [c172]Hoil Ryu, Dongwoo Kang, Dongho Won:
On a Partially Verifiable Multi-party Multi-argument Zero-knowledge Proof. IMCOM 2021: 1-8 - [i17]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021) - 2020
- [j63]Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. J. Inf. Secur. Appl. 52: 102494 (2020) - [j62]Jihyeon Ryu
, Dongwoo Kang, Hakjun Lee
, Hyoungshick Kim
, Dongho Won:
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors 20(24): 7136 (2020) - [c171]Sewan Ha, Hakjun Lee, Dongho Won, Youngsook Lee:
Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS. IMCOM 2020: 1-8 - [c170]Dongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee:
Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem. IMCOM 2020: 1-8 - [c169]Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. IMCOM 2020: 1-4
2010 – 2019
- 2018
- [j61]Dongwoo Kang
, Jaewook Jung
, Hyoungshick Kim
, Youngsook Lee
, Dongho Won
:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Secur. Commun. Networks 2018: 9046064:1-9046064:14 (2018) - [j60]Jihyeon Ryu
, Hakjun Lee
, Hyoungshick Kim
, Dongho Won:
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors 18(12): 4481 (2018) - [c168]Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, Dongho Won:
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks. ICCSA (2) 2018: 50-61 - [c167]Jongho Moon
, Youngsook Lee, Hyungkyu Yang, Hakjun Lee, Sewan Ha, Dongho Won:
Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments. ICCSA (1) 2018: 541-557 - [c166]Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won:
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. ICOIN 2018: 432-437 - [c165]Chunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme. ICOIN 2018: 438-441 - [c164]Jongho Moon, Taeui Song, Seokhyang Cho, Dongho Won:
Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments. IMCOM 2018: 4:1-4:8 - 2017
- [j59]Jongho Moon, Donghoon Lee, Jaewook Jung, Dongho Won:
Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme. Int. J. Netw. Secur. 19(6): 1053-1061 (2017) - [j58]Jaewook Jung, Jongho Moon, Dongho Won:
Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. KSII Trans. Internet Inf. Syst. 11(7): 3720-3746 (2017) - [j57]Donghoon Lee, Dongwoo Kang, Jiye Kim, Dongho Won:
Software Birthmark Method Using Combined Structure-Based and API-Based. J. Softw. 12(2): 138-144 (2017) - [j56]Jongho Moon
, Youngsook Lee
, Jiye Kim, Dongho Won
:
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. Secur. Commun. Networks 2017: 1378128:1-1378128:13 (2017) - [j55]Jaewook Jung
, Jongho Moon
, Donghoon Lee, Dongho Won:
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks. Sensors 17(3): 644 (2017) - [j54]Jongho Moon
, Donghoon Lee, Youngsook Lee, Dongho Won:
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks. Sensors 17(5): 940 (2017) - [c163]Jongho Moon, Jiye Kim, Donghoon Lee, Dongho Won:
Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment. ACIT/CSII/BCD 2017: 14-19 - [c162]Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won:
Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards. AHFE (9) 2017: 62-71 - [c161]Jongho Moon, Taeui Song, Donghoon Lee, Youngsook Lee, Dongho Won:
Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security. AHFE (9) 2017: 72-77 - [c160]Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won:
Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. AHFE (9) 2017: 78-84 - [c159]Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won:
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks. ICDIM 2017: 139-143 - [c158]Jongho Moon, Hyungkyu Yang, Youngsook Lee, Dongho Won:
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care. IMCOM 2017: 11 - [c157]Dongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, Dongho Won:
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems. IMCOM 2017: 18 - [c156]Hakjun Lee, Jiye Kim, Jaewook Jung, Youngsook Lee, Dongho Won:
An enhanced unlinkable anonymous payment scheme based on near field commnication. IMCOM 2017: 38 - [c155]Chunyi Quan, Jaewook Jung, Jiye Kim, Qimin Sun, Donghoon Lee, Dongho Won:
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme. IMCOM 2017: 50 - 2016
- [j53]Fikadu B. Degefa, Donghoon Lee, Jiye Kim, Younsung Choi
, Dongho Won:
Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Comput. Networks 94: 145-163 (2016) - [j52]Donghoon Lee, Dongwoo Kang, Younsung Choi
, Jiye Kim, Dongho Won:
API-Based Software Birthmarking Method Using Fuzzy Hashing. IEICE Trans. Inf. Syst. 99-D(7): 1836-1851 (2016) - [j51]Donghoon Lee, Jaewook Jung, Younsung Choi
, Dongho Won:
Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(12): 2585-2590 (2016) - [j50]Younsung Choi
, Youngsook Lee, Dongho Won:
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction. Int. J. Distributed Sens. Networks 12(1): 8572410:1-8572410:16 (2016) - [j49]Hanwook Lee, Junghyun Nam, Moonseong Kim, Dongho Won:
Forward Anonymity-Preserving Secure Remote Authentication Scheme. KSII Trans. Internet Inf. Syst. 10(3): 1289-1310 (2016) - [j48]Jongho Mun, Jiye Kim, Dongho Won:
An Improvement of User Authentication Framework for Cloud Computing. J. Comput. 11(6): 446-454 (2016) - [j47]Jongho Moon, Younsung Choi
, Jiye Kim, Dongho Won:
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Medical Syst. 40(3): 70:1-70:11 (2016) - [j46]Jiye Kim, Jongho Moon, Jaewook Jung, Dongho Won:
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks. J. Sensors 2016: 4393721:1-4393721:17 (2016) - [j45]Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi
, Dongho Won:
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Networks 9(11): 1462-1476 (2016) - [j44]Jaewook Jung
, Jiye Kim, Younsung Choi
, Dongho Won:
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks. Sensors 16(8): 1299 (2016) - [j43]Youngseok Chung, Seokjin Choi, Youngsook Lee, Namje Park
, Dongho Won:
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks. Sensors 16(10): 1653 (2016) - [c154]Qimin Sun, Jongho Moon, Younsung Choi
, Dongho Won:
An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment. GPC 2016: 229-242 - [c153]Dongwoo Kang, Jongho Moon, Donghoon Lee, Dongho Won:
Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment. ICCSA (5) 2016: 87-99 - [c152]Youngseok Chung, Seokjin Choi, Dongho Won:
Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks. ICCSA (4) 2016: 289-301 - [c151]Jongho Moon, Jiseon Yu, Hyungkyu Yang, Dongho Won:
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments. IMCOM 2016: 7:1-7:8 - [c150]Jaewook Jung, Donghoon Lee, Jiye Kim, Youngsook Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. IMCOM 2016: 23:1-23:8 - 2015
- [j42]Kyungho Son, Dong-Guk Han, Dongho Won:
Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property. IEICE Trans. Commun. 98-B(1): 160-170 (2015) - [j41]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik
, Dongho Won:
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 424-427 (2015) - [j40]Youngseok Chung, Seokjin Choi, Dongho Won
:
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments. Int. J. Distributed Sens. Networks 11: 305785:1-305785:13 (2015) - [j39]Junghyun Nam, Kim-Kwang Raymond Choo
, Sangchul Han, Juryon Paik
, Dongho Won:
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting. Symmetry 7(1): 105-124 (2015) - [j38]Hanwook Lee
, Dongho Won:
Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE). Symmetry 7(3): 1587-1594 (2015) - [c149]Jongho Mun, Jiseon Yu, Jiye Kim, Hyungkyu Yang, Dongho Won:
Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem. CSA/CUTE 2015: 1-6 - [c148]Younsung Choi
, Youngsook Lee, Dongho Won:
Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks. CSA/CUTE 2015: 7-13 - [c147]Jaewook Jung, Younsung Choi
, Donghoon Lee, Jiye Kim, Jongho Mun, Dongho Won:
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables. CSA/CUTE 2015: 45-51 - [c146]Dongwoo Kang, Jongho Mun, Donghoon Lee, Dongho Won:
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices. CSA/CUTE 2015: 309-315 - [c145]Hanwook Lee
, Jongho Mun, Jiye Kim, Youngsook Lee, Dongho Won:
Secure Deletion for Flash-Based Self-Encrypting Drives. CSA/CUTE 2015: 559-566 - [c144]Jiye Kim, Donghoon Lee, Younsung Choi
, Youngsook Lee, Dongho Won:
Security Improvement of Portable Key Management Using a Mobile Phone. ICCSA (4) 2015: 148-159 - [c143]Jongho Mun, Jiye Kim, Donghoon Lee, Dongho Won:
Cryptanalysis of biometric-based multi-server authentication scheme using smart card. QSHINE 2015: 56-59 - [i16]Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Moonseong Kim, Juryon Paik, Dongho Won:
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. CoRR abs/1509.06813 (2015) - 2014
- [j37]Kim-Kwang Raymond Choo
, Junghyun Nam, Dongho Won:
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281: 182-200 (2014) - [j36]Juryon Paik, Junghyun Nam, Ung-Mo Kim, Dongho Won:
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data. J. Inf. Sci. Eng. 30(3): 787-817 (2014) - [j35]Jiye Kim, Donghoon Lee, Woongryul Jeon, Youngsook Lee, Dongho Won:
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks. Sensors 14(4): 6443-6462 (2014) - [j34]Younsung Choi
, Donghoon Lee, Jiye Kim, Jaewook Jung
, Junghyun Nam, Dongho Won:
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 14(6): 10081-10106 (2014) - [j33]Juryon Paik
, Junghyun Nam, Ung-Mo Kim, Dongho Won:
Association Rule Extraction from XML Stream Data for Wireless Sensor Networks. Sensors 14(7): 12937-12957 (2014) - [j32]Junghyun Nam, Moonseong Kim, Juryon Paik
, Youngsook Lee, Dongho Won:
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks. Sensors 14(11): 21023-21044 (2014) - [c142]Youngsung Choi
, Donghoon Lee, Woongryul Jeon, Dongho Won:
Password-based single-file encryption and secure data deletion for solid-state drive. ICUIMC 2014: 5:1-5:7 - [c141]Jaewook Jung, Woongryul Jeon, Dongho Won:
An enhanced remote user authentication scheme using smart card. ICUIMC 2014: 62:1-62:5 - [i15]Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won:
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. IACR Cryptol. ePrint Arch. 2014: 358 (2014) - [i14]Youngsung Choi, Dongho Won:
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System. IACR Cryptol. ePrint Arch. 2014: 366 (2014) - [i13]Youngsung Choi, Dongho Won:
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System. IACR Cryptol. ePrint Arch. 2014: 383 (2014) - 2013
- [j31]Keunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo Park:
Threat modeling of a mobile device management system for secure smart work. Electron. Commer. Res. 13(3): 243-256 (2013) - [j30]Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik, Dongho Won:
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols. KSII Trans. Internet Inf. Syst. 7(12): 3244-3260 (2013) - [j29]Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim:
Hybrid Key Management Architecture for Robust SCADA Systems. J. Inf. Sci. Eng. 29(2): 281-298 (2013) - [j28]Hong Va Leong, Taeho Cho, Sang-Won Lee, Dong Ryeol Shin, Dongho Won, Sungyoung Lee:
Guest Editorial. J. Softw. 8(3): 503-506 (2013) - [j27]Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim
:
Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea. J. Softw. 8(3): 520-527 (2013) - [j26]Junwon Lee, Jaeik Cho, Jung-Taek Seo
, Taeshik Shon, Dongho Won:
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed. Mob. Networks Appl. 18(1): 122-128 (2013) - [c140]Youngsook Lee, Dongho Won:
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol. GPC 2013: 730-736 - [c139]Youngseok Chung, Youngsook Lee, Dongho Won:
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. GPC 2013: 752-760 - [c138]Mijin Kim, Namje Park
, Dongho Won:
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. GPC 2013: 761-766 - [c137]Hyun-Jung Lee, Youngsook Lee, Dongho Won:
Security Requirement of End Point Security Software. GPC 2013: 788-795 - [c136]Inkyung Jeun, Youngsook Lee, Dongho Won:
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. GPC 2013: 796-802 - [c135]Hyunsik Yang, Qiuyan Jin, Hanwook Lee
, Kwang-Woo Lee, Dongho Won:
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity. GPC 2013: 803-810 - [c134]Keunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, Dongho Won:
High-Level Design for a Secure Mobile Device Management System. HCI (27) 2013: 348-356 - [c133]Jongho Mun, Qiuyan Jin, Woongryul Jeon, Dongho Won:
An Improvement of Secure Remote User Authentication Scheme Using Smart Cards. ICITCS 2013: 1-4 - [c132]Woongryul Jeon, Yunho Lee, Dongho Won:
A secure user-friendly authentication scheme with anonymity for wireless communications. ICUIMC 2013: 110 - [c131]Mijin Kim, Namje Park
, Dongho Won:
Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing. MUSIC 2013: 483-488 - [c130]Hyun-Jung Lee, Youngsook Lee, Dongho Won:
Protection Profile for PoS (Point of Sale) System. MUSIC 2013: 495-500 - [c129]Fikadu B. Degefa, Dongho Won:
Scalable Key Management for Dynamic Group in Multi-cast Communication. MUSIC 2013: 521-527 - [c128]Youngseok Chung, Seokjin Choi, Youngsook Lee, Dongho Won:
Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks. MUSIC 2013: 535-540 - [i12]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
On the security of a password-only authenticated three-party key exchange protocol. IACR Cryptol. ePrint Arch. 2013: 540 (2013) - [i11]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013: 666 (2013) - 2012
- [j25]Kyungho Son, Dong-Guk Han, Dongho Won:
A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards. IEICE Trans. Commun. 95-B(5): 1819-1821 (2012) - [j24]Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, Dongho Won:
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments. IEICE Trans. Commun. 95-B(7): 2505-2508 (2012) - [j23]Junghyun Nam, Moonseong Kim, Juryon Paik
, Dongho Won:
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment. KSII Trans. Internet Inf. Syst. 6(2): 751-765 (2012) - [j22]Junghyun Nam, Minkyu Park, Sangchul Han, Juryon Paik, Dongho Won:
Scalable Group Key Exchange for Securing Distributed Operating Systems. J. Inf. Sci. Eng. 28(5): 829-857 (2012) - [c127]Hanjae Jeong, Dongho Won:
A Study on Method to Analyze Application on Bada Using GUI without Source Code. AsiaJCIS 2012: 70-73 - [c126]Heasuk Jo, Seungjoo Kim
, Dongho Won:
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer. CUBE 2012: 816-819 - [c125]Inkyung Jeun, Mijin Kim, Dongho Won:
Enhanced Password-Based User Authentication Using Smart Phone. GPC 2012: 350-360 - [c124]Hakhyun Kim, Woongryul Jeon, Kwang-Woo Lee, Yunho Lee, Dongho Won:
Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme. ICCSA (3) 2012: 391-406 - [c123]Changwhan Lee, Hyunsik Yang, Byunghee Lee, Dongho Won:
A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques. ICHIT (1) 2012: 608-617 - [c122]Hanjae Jeong, Seungjoo Kim
, Dongho Won:
On the security of an novel protocol for downloadable CAS. ICUIMC 2012: 65:1-65:5 - [c121]Jaesung Yoo, Hanjae Jeong, Dongho Won:
A method for secure and efficient block cipher using white-box cryptography. ICUIMC 2012: 89:1-89:8 - [c120]Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won:
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity. ITCS 2012: 225-231 - [c119]Mijin Kim, Namje Park
, Dongho Won:
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. ITCS 2012: 233-240 - [c118]Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, Dongho Won:
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device. ITCS 2012: 241-247 - [c117]Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won:
Database Encryption Implementation and Analysis Using Graphics Processing Unit. MUSIC 2012: 109-113 - [c116]