Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Seungjoo
    Last name: Kim
    DBLP: 81/812
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 93 of 93  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim.
    Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea.
    JSW 2013, Volume 8 (0) 2013
    Journal article
    Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim.
    Hybrid Key Management Architecture for Robust SCADA Systems.
    J. Inf. Sci. Eng. 2013, Volume 29 (0) 2013
    Journal article
    Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim.
    Efficient certificateless proxy signature scheme with provable security.
    Inf. Sci. 2012, Volume 188 (0) 2012
    Conference paper
    Hanjae Jeong, Seungjoo Kim, Dongho Won.
    On the security of an novel protocol for downloadable CAS.
    The 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC '12, Kuala Lumpur, Malaysia, February 20-22, 2012 2012 (0) 2012
    Conference paper
    Heasuk Jo, Seungjoo Kim, Dongho Won.
    Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.
    CUBE International IT Conference Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012 2012 (0) 2012
    Conference paper
    Kyoungju Kwak, Kwang-Woo Lee, Dongho Won, Seungjoo Kim.
    Analysis and countermeasures of security vulnerability on portal sites.
    Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Republic of Korea, February 21 - 23, 2011 2011 (0) 2011
    Conference paper
    Byunghee Lee, Kyungho Son, Dongho Won, Seungjoo Kim.
    Secure Data Deletion for USB Flash Memory.
    J. Inf. Sci. Eng. 2011, Volume 27 (0) 2011
    Conference paper
    Heasuk Jo, Seungjoo Kim, Dongho Won.
    Advanced Information Security Management Evaluation System.
    TIIS 2011, Volume 5 (0) 2011
    Conference paper
    Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim, Dongho Won.
    Towards trustworthy e-voting using paper receipts.
    Computer Standards Interfaces 2010, Volume 32 (0) 2010
    Conference paper
    Taehyun Kim, Dongho Won, Kwang-Woo Lee, Hogab Kang, Seungjoo Kim.
    Automated DCI compliance test system for Digital Cinema Entities.
    International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advan 2010 (0) 2010
    Conference paper
    Mijin Kim, Seungjoo Kim, Dongho Won.
    An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity.
    Web Information Systems and Mining - International Conference, WISM 2010, Sanya, China, October 23-24, 2010. Proceedings 2010 (0) 2010
    Journal article
    Hanjae Jeong, Dongho Won, Seungjoo Kim.
    Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
    J. Inf. Sci. Eng. 2010, Volume 26 (0) 2010
    Conference paper
    Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim.
    Security analysis on commercial online music streaming service and countermeasures.
    Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010 2010 (0) 2010
    Conference paper
    Heasuk Jo, Seungjoo Kim, Dongho Won.
    A Study on Comparative Analysis of the Information Security Management Systems.
    Computational Science and Its Applications - ICCSA 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part IV 2010 (0) 2010
    Journal article
    Yunho Lee, Seungjoo Kim, Dongho Won.
    Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.
    Computers Electrical Engineering 2010, Volume 36 (0) 2010
    Conference paper
    Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim.
    Protection Profile for Secure E-Voting Systems.
    Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim.
    A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), .
    Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won.
    Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
    International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advan 2009 (0) 2009
    Conference paper
    Mijin Kim, Byunghee Lee, Seungjoo Kim, Dongho Won.
    Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme.
    Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim.
    Cipher Suite Setting Problem of SSL Protocol and it's Solutions.
    23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009 2009 (0) 2009
    Conference paper
    Kwang-Woo Lee, Yunho Lee, Seungjoo Kim, Dongho Won.
    A Practical Approach to a Reliable Electronic Election.
    Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II 2009 (0) 2009
    Conference paper
    Wansuck Yi, Seungjoo Kim, Dongho Won.
    Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.
    Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II 2009 (0) 2009
    Conference paper
    Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won.
    Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.
    Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II 2009 (0) 2009
    Conference paper
    Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won.
    Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
    Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Yunho Lee, Seungjoo Kim, Dongho Won.
    How to Trust DRE Voting Machines Preserving Voter Privacy.
    2008 IEEE International Conference on e-Business Engineering, ICEBE 2008, Xi'an, China, October 22-24, 2008 2008 (0) 2008
    Conference paper
    Donghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim.
    Protection Profile for Connected Interoperable DRM Framework.
    Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers 2009 (0) 2008
    Conference paper
    Sumin Hong, Woongryul Jeon, Seungjoo Kim, Dongho Won, Choonsik Park.
    The Vulnerabilities Analysis of Fuzzy Vault Using Password.
    International Conference on Bio-Science and Bio-Technology, BSBT 2008, part of the Second International Conference on Future Generation Communication and Networking, FGCN 2008, Volume 3, Hainan Island, China, December 13-15, 2008 2008 (0) 2008
    Conference paper
    Namje Park, Dooho Choi, Seungjoo Kim, Dongho Won.
    Enforcing security in mobile RFID networks multilateral approaches and solutions.
    IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil 2008 (0) 2008
    Conference paper
    Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won.
    An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
    Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Namje Park, Seungjoo Kim, Dongho Won.
    Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.
    Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25 - 27, 2007 2007 (0) 2007
    Conference paper
    Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won.
    Efficient Password-Authenticated Key Exchange Based on RSA.
    Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings 2006 (0) 2007
    Conference paper
    Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won.
    Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.
    Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part 2007 (0) 2007
    Conference paper
    YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won.
    A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.
    Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Junghyun Nam, Seungjoo Kim, Sangjoon Park, Dongho Won.
    Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards.
    IEICE Transactions 2007, Volume 90 (0) 2007
    Conference paper
    Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won.
    Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
    Inf. Sci. 2007, Volume 177 (0) 2007
    Journal article
    Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won.
    Towards Trustworthy e-Voting using Paper Receipts.
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Conference paper
    Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim.
    WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.
    Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won.
    An RFID System Based MCLT System with Improved Privacy.
    Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings 2006 (0) 2006
    Conference paper
    YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won.
    A PKI System for Detecting the Exposure of a User's Secret Key.
    Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won.
    Two Efficient and Secure Authentication Schemes Using Smart Cards.
    Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V 2006 (0) 2006
    Conference paper
    He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won.
    Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
    Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II 2006 (0) 2006
    Conference paper
    Namje Park, Seungjoo Kim, Dongho Won, Howon Kim.
    Security Analysis and Implementation Leveraging Globally Networked RFIDs.
    Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won.
    Group Key Agreement Protocol Among Mobile Devices in Different Cells.
    Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim.
    Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.
    Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I 2006 (0) 2006
    Conference paper
    Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won.
    An Efficient Dispute Resolving Method for Digital Images.
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeB 2006 (0) 2006
    Conference paper
    Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won.
    Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.
    Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers 2007 (0) 2006
    Conference paper
    Yunho Lee, Seungjoo Kim, Dongho Won.
    Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.
    IEICE Transactions 2006, Volume 89 (0) 2006
    Conference paper
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.
    IEICE Transactions 2006, Volume 89 (0) 2006
    Conference paper
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords.
    IEICE Transactions 2006, Volume 89 (0) 2006
    Journal article
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.
    IACR Cryptology ePrint Archive 2005, Volume 2005 (0) 2005
    Journal article
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.
    IEEE Communications Letters 2005, Volume 9 (0) 2005
    Conference paper
    Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won.
    XKMS-Based Key Management for Open LBS in Web Services Environment.
    Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, AWIC 2005, Lodz, Poland, June 6-9, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won.
    XML-Based Security Acceleration Methods Supporting Fast Mobile Grid.
    E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won.
    RFID System with Fairness Within the Framework of Security and Privacy.
    Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers 2005 (0) 2005
    Conference paper
    Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang.
    A Method for Deciding Quantization Steps in QIM Watermarking Schemes.
    Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings 2005 (0) 2005
    Conference paper
    YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won.
    A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
    Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers 2005 (0) 2005
    Conference paper
    Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won.
    XML-Based Digital Signature Accelerator in Open Mobile Grid Computing.
    Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang.
    Practical and Provably-Secure Multicasting over High-Delay Networks.
    Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part II 2005 (0) 2005
    Conference paper
    Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won.
    An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.
    Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I 2005 (0) 2005
    Conference paper
    Namje Park, Howon Kim, Seungjoo Kim, Dongho Won.
    Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.
    Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II 2005 (0) 2005
    Conference paper
    Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won.
    Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV.
    Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II 2005 (0) 2005
    Conference paper
    Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won.
    Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
    Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    Secure Group Communications over Combined Wired and Wireless Networks.
    Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
    Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers 2006 (0) 2005
    Conference paper
    Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won.
    DDH-based group key agreement in a mobile environment.
    Journal of Systems and Software 2005, Volume 78 (0) 2005
    Journal article
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Journal article
    Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won.
    Secure Group Communications over Combined Wired/Wireless Networks.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Journal article
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Journal article
    Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won.
    Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Journal article
    Junghyun Nam, Seungjoo Kim, Dongho Won.
    Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Journal article
    Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won.
    DDH-based Group Key Agreement in a Mobile Environment.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Conference paper
    Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won.
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
    Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I 2004 (0) 2004
    Conference paper
    Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won.
    Simple and Efficient Group Key Agreement Based on Factoring.
    Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I 2004 (0) 2004
    Conference paper
    Seungjoo Kim, Dongho Won.
    Threshold Entrusted Undeniable Signature.
    Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers 2005 (0) 2004
    Conference paper
    Seungjoo Kim, Masahiro Mambo, Yuliang Zheng.
    Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption.
    Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim.
    An Analysis of Proxy Signatures: Is a Secure Channel Necessary?
    Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won.
    An Improvement of VeriSign's Key Roaming Service Protocol.
    Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim.
    Prime Numbers of Diffie-Hellman Groups for IKE-MODP.
    Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, Seonhee Yoon.
    Differential and linear cryptanalysis for 2-round SPNs.
    Inf. Process. Lett. 2003, Volume 87 (0) 2003
    Conference paper
    Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon.
    RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
    IEEE Trans. Computers 2003, Volume 52 (0) 2003
    Conference paper
    Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon.
    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.
    Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings 2002 (0) 2001
    Conference paper
    Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon.
    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
    Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings 2002 (0) 2001
    Conference paper
    Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng.
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
    Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim.
    Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.
    Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee.
    XTR Extended to GF(p
    Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers 2001 (0) 2001
    Conference paper
    Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won.
    Forward-Secure Commercial Key Escrow Systems.
    10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA 2001 (0) 2001
    Conference paper
    Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee.
    A Generalized Takagi-Cryptosystem with a modulus of the form
    Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park.
    On the Difficulty of Key Recovery Systems.
    Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings 1999 (0) 1999
    Conference paper
    Marc Joye, Seungjoo Kim, Narn-Yih Lee.
    Cryptanalysis of Two Group Signature Schemes.
    Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings 1999 (0) 1999
    Conference paper
    Seungjoo Kim, Soohyun Oh, Dongho Won.
    One-time self-certified public keys, revisited.
    The 1st International Conference on Information Security and Cryptology, ICSCI '98, December 18-19, 1998, Seoul, Korea, Proceedings 1998 (0) 1998
    Conference paper
    Seungjoo Kim, Sangjoon Park, Dongho Won.
    Proxy signatures, Revisited.
    Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings 1997 (0) 1997
    Conference paper
    Seungjoo Kim, Sangjoon Park, Dongho Won.
    Group Signatures for Hierarchical Multigroups.
    Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings 1998 (0) 1997
    Conference paper
    Seungjoo Kim, Sungjun Park, Dongho Won.
    Convertible Group Signatures.
    Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings 1996 (0) 1996
    Show item 1 to 93 of 93  

    Your query returned 93 matches in the database.