Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Seungjoo
    Last name: Kim
    DBLP: 81/812
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 93  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim.
    Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea.
    JSW 2013, Volume 8 (0) 2013
    Journal article
    Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim.
    Hybrid Key Management Architecture for Robust SCADA Systems.
    J. Inf. Sci. Eng. 2013, Volume 29 (0) 2013
    Journal article
    Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim.
    Efficient certificateless proxy signature scheme with provable security.
    Inf. Sci. 2012, Volume 188 (0) 2012
    Conference paper
    Hanjae Jeong, Seungjoo Kim, Dongho Won.
    On the security of an novel protocol for downloadable CAS.
    The 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC '12, Kuala Lumpur, Malaysia, February 20-22, 2012 2012 (0) 2012
    Conference paper
    Heasuk Jo, Seungjoo Kim, Dongho Won.
    Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.
    CUBE International IT Conference Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012 2012 (0) 2012
    Conference paper
    Kyoungju Kwak, Kwang-Woo Lee, Dongho Won, Seungjoo Kim.
    Analysis and countermeasures of security vulnerability on portal sites.
    Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Republic of Korea, February 21 - 23, 2011 2011 (0) 2011
    Conference paper
    Byunghee Lee, Kyungho Son, Dongho Won, Seungjoo Kim.
    Secure Data Deletion for USB Flash Memory.
    J. Inf. Sci. Eng. 2011, Volume 27 (0) 2011
    Conference paper
    Heasuk Jo, Seungjoo Kim, Dongho Won.
    Advanced Information Security Management Evaluation System.
    TIIS 2011, Volume 5 (0) 2011
    Conference paper
    Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim, Dongho Won.
    Towards trustworthy e-voting using paper receipts.
    Computer Standards Interfaces 2010, Volume 32 (0) 2010
    Conference paper
    Taehyun Kim, Dongho Won, Kwang-Woo Lee, Hogab Kang, Seungjoo Kim.
    Automated DCI compliance test system for Digital Cinema Entities.
    International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advan 2010 (0) 2010
    Conference paper
    Mijin Kim, Seungjoo Kim, Dongho Won.
    An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity.
    Web Information Systems and Mining - International Conference, WISM 2010, Sanya, China, October 23-24, 2010. Proceedings 2010 (0) 2010
    Journal article
    Hanjae Jeong, Dongho Won, Seungjoo Kim.
    Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
    J. Inf. Sci. Eng. 2010, Volume 26 (0) 2010
    Conference paper
    Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim.
    Security analysis on commercial online music streaming service and countermeasures.
    Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010 2010 (0) 2010
    Conference paper
    Heasuk Jo, Seungjoo Kim, Dongho Won.
    A Study on Comparative Analysis of the Information Security Management Systems.
    Computational Science and Its Applications - ICCSA 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part IV 2010 (0) 2010
    Journal article
    Yunho Lee, Seungjoo Kim, Dongho Won.
    Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.
    Computers Electrical Engineering 2010, Volume 36 (0) 2010
    Conference paper
    Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim.
    Protection Profile for Secure E-Voting Systems.
    Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim.
    A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), .
    Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won.
    Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
    International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advan 2009 (0) 2009
    Conference paper
    Mijin Kim, Byunghee Lee, Seungjoo Kim, Dongho Won.
    Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme.
    Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim.
    Cipher Suite Setting Problem of SSL Protocol and it's Solutions.
    23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009 2009 (0) 2009
    Conference paper
    Kwang-Woo Lee, Yunho Lee, Seungjoo Kim, Dongho Won.
    A Practical Approach to a Reliable Electronic Election.
    Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II 2009 (0) 2009
    Conference paper
    Wansuck Yi, Seungjoo Kim, Dongho Won.
    Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.
    Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II 2009 (0) 2009
    Conference paper
    Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won.
    Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.
    Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II 2009 (0) 2009
    Conference paper
    Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won.
    Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
    Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Yunho Lee, Seungjoo Kim, Dongho Won.
    How to Trust DRE Voting Machines Preserving Voter Privacy.
    2008 IEEE International Conference on e-Business Engineering, ICEBE 2008, Xi'an, China, October 22-24, 2008 2008 (0) 2008
    Show item 1 to 25 of 93  

    Your query returned 93 matches in the database.