Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords J Kim, S Kim, J Kwak, D Won International Conference on Computational Science and Its Applications, 895-902, 2004 | 63 | 2004 |
An enhanced secure authentication scheme with anonymity for wireless environments W Jeon, J Kim, J Nam, Y Lee, D Won IEICE Transactions on Communications 95 (7), 2505-2508, 2012 | 26 | 2012 |
Analysis of Threats and Countermeasures on Mobile Smartphone WR Jeon, JY Kim, YS Lee, DH Won Journal of The Korea Society of Computer and Information 16 (2), 153-163, 2011 | 14 | 2011 |
Design of a simple user authentication scheme using QR-code for mobile device Y Lee, J Kim, W Jeon, D Won Information Technology Convergence, Secure and Trust Computing, and Data …, 2012 | 11 | 2012 |
Security analysis of authentication scheme for wireless communications with user anonymity W Jeon, J Kim, Y Lee, D Won Information technology convergence, secure and trust computing, and data …, 2012 | 9 | 2012 |
Security issues and threats according to the attribute of cloud computing H Lee, J Kim, Y Lee, D Won Computer Applications for Security, Control and System Engineering, 101-108, 2012 | 7 | 2012 |
Forward-secure commercial key escrow systems J Kim, S Kim, H Kwon, S Lee, S Park, D Won Proceedings Tenth IEEE International Workshop on Enabling Technologies …, 2001 | 6 | 2001 |
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment Y Lee, J Kim, D Won Symposium on Human Interface, 321-329, 2011 | 4 | 2011 |
Server-aided password-authenticated key exchange: from 3-party to group J Nam, J Paik, J Kim, Y Lee, D Won Symposium on Human Interface, 339-348, 2011 | 3 | 2011 |
Group key agreement protocol among mobile devices in different cells J Kim, S Kim, K Chun, J Lee, D Won International Symposium on Parallel and Distributed Processing and …, 2006 | 3 | 2006 |
Security controls based on K-ISMS in cloud computing service J Mun, Y Jung, J Kim, Y Lee, K Park, D Won Advances in Computer Science and its Applications, 391-404, 2014 | 2 | 2014 |
Security analysis on digital signature function implemented in PDF software S Park, C Lee, K Lee, J Kim, Y Lee, D Won International Conference on Future Generation Information Technology, 327-334, 2011 | 2 | 2011 |
An improvement of VeriSign’s key roaming service protocol J Kim, H Kwon, H Park, S Kim, D Won International Conference on Web Engineering, 281-288, 2003 | 2 | 2003 |
Yi et al.s Group Key Exchange Protocol: A Security Vulnerability and its Remediation YS Lee, JY Kim, DH Won Journal of the Korea Society of Computer and Information 17 (4), 91-98, 2012 | 1 | 2012 |
Vulnerability Analysis on Digital Signature Function of Word Processors CB Lee, SW Park, KW Lee, JY Kim, JH Nam, YS Lee, DH Won Journal of the Korea Society of Computer and Information 16 (8), 109-118, 2011 | 1 | 2011 |
전자문서 소프트웨어의전자서명 기능에 대한 안전성 분석 S Park, C Lee, K Lee, J Kim, Y Lee, D Won | 1* | |
Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks Y Lee, J Kim, D Won Computer Science and its Applications, 707-714, 2012 | | 2012 |
Security Analysis on Digital Signature Function Implemented in Electronic Documents Software S Park, C Lee, K Lee, J Kim, Y Lee, D Won Journal of the Korea Institute of Information Security and Cryptology 22 (5 …, 2012 | | 2012 |
Terrestrial Wireless Communication/Broadcasting Technologies-An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments W Jeon, J Kim, J Nam, Y Lee, D Won IEICE Transactions on Communications 95 (7), 2505, 2012 | | 2012 |
An Efficient Mixnet for Electronic Voting Systems WR Jeon, JY Kim, YS Lee, DH Won Journal of the Korea Institute of Information Security and Cryptology 22 (1 …, 2012 | | 2012 |