• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19962021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    Proof-of-stake at stake: Predatory, destructive attack on PoS cryptocurrencies

    Lee, S. & Kim, S., 2020 Sep 25, CRYBLOCK 2020 - Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, Part of MobiCom 2020. Association for Computing Machinery, p. 7-11 5 p. 3413791. (CRYBLOCK 2020 - Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, Part of MobiCom 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Study on the Smart Speaker Security Evaluations and Countermeasures

    Lee, J., Kang, S. & Kim, S., 2020, Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019. Yang, L. T., Hao, F., Jeong, Y-S. & Park, J. J. (eds.). Springer Verlag, p. 50-70 21 p. (Lecture Notes in Electrical Engineering; vol. 590).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Countering Block Withholding Attack Efficiently

    Lee, S. & Kim, S., 2019 Apr, INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019. Institute of Electrical and Electronics Engineers Inc., p. 330-335 6 p. 8845116. (INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2015

    Preserving biosensor users' anonymity over wireless cellular network

    Baek, S., Seo, S. H. & Kim, S., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 470-475 6 p. 7182588. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2013

    A study on weakness and improvement of Cloud Shredder

    Park, M., Kang, S. & Kim, S., 2013, 2013 International Conference on ICT Convergence: "Future Creative Convergence Technologies for New ICT Ecosystems", ICTC 2013. IEEE Computer Society, p. 1107-1113 7 p. 6675569. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Vulnerabilities of android data sharing and malicious application to leaking private information

    Cho, T., Kim, J. H., Cho, H. J., Seo, S. H. & Kim, S., 2013, ICUFN 2013 - 5th International Conference on Ubiquitous and Future Networks. p. 37-42 6 p. 6614773. (International Conference on Ubiquitous and Future Networks, ICUFN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • 2012

    Construction of a privacy preserving mobile social networking service

    Jung, J., Kim, H., You, J., Lee, C., Kim, S. & Won, D., 2012, IT Convergence and Services, ITCS 2011 and IRoA 2011. p. 251-261 11 p. (Lecture Notes in Electrical Engineering; vol. 107 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the security of an novel protocol for downloadable CAS

    Jeong, H., Kim, S. & Won, D., 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 65. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Weakness and simple improvement of anonymous mutual authentication protocol with link-layer

    Jo, H., Kim, S. & Won, D., 2012, Proceedings of the CUBE International Information Technology Conference, CUBE 2012. p. 816-819 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Analysis and countermeasures of security vulnerability on portal sites

    Kwak, K., Lee, K., Won, D. & Kim, S., 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 98. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis on vulnerability of home healthcare medical devices and development of protection profile based on Common Criteria version 3.1

    Lee, C., Kim, S., Lee, K. & Won, D., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 240-247 8 p. 5954315. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An analysis of Multi-Function Peripheral with a digital forensics perspective

    Lee, K., Kim, S., Lee, C., Won, D. & Park, N., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 252-257 6 p. 5954317. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2010

    An exquisite authentication scheme with key agreement preserving user anonymity

    Kim, M., Kim, S. & Won, D., 2010, Web Information Systems and Mining - International Conference, WISM 2010, Proceedings. M4D ed. p. 244-253 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6318 LNCS, no. M4D).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A practical approach to a secure e-will system in the R.O.C.

    Lee, K., Won, D. & Kim, S., 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2010. 5677756. (2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A proposal of appropriate evaluation scheme for exchangeable cas (XCAS)

    Hwang, Y. N., Jeong, H., Cho, S., Kim, S., Won, D. & Kim, S., 2010, Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings. p. 217-228 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A study on comparative analysis of the information security management systems

    Jo, H., Kim, S. & Won, D., 2010, Computational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 510-519 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6019 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Automated DCI compliance test system for digital cinema entities

    Kim, T., Won, O., Lee, K., Kang, H. & Kim, S., 2010, Proceeding - 6th International Conference on Networked Computing and Advanced Information Management, NCM2010. p. 434-439 6 p. 5572073. (Proceeding - 6th International Conference on Networked Computing and Advanced Information Management, NCM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Protection profile for secure e-voting systems

    Lee, K., Lee, Y., Won, D. & Kim, S., 2010, Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings. p. 386-397 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Security analysis on commercial online music streaming service and countermeasures

    Lee, S., Choi, D., Won, D. & Kim, S., 2010, Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 10. p. 408-414 7 p. (Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication ICUIMC 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • u-Healthcare system protecting privacy based on cloaker

    Son, S., Lee, K., Won, D. & Kim, S., 2010, 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, BIBMW 2010. p. 417-423 7 p. 5703838. (2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, BIBMW 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Vulnerabilities and improvements of Du-Xiao-Chen-Wu's secure cell relay routing protocol for sensor networks

    Rhee, K., Lee, B., Won, D., Na, H. Y. & Kim, S., 2010, Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010. p. 1-4 4 p. 5633152. (Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    A practical approach to a reliable electronic election

    Lee, K., Lee, Y., Kim, S. & Won, D., 2009, Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings. PART 2 ed. p. 191-203 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5593 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cipher suite setting problem of SSL protocol and it's solutions

    Lee, Y., Hur, S., Won, D. & Kim, S., 2009, Proceedings - 2009 International Conference on Advanced Information Networking and Applications Workshops, WAINA 2009. p. 140-146 7 p. 5136638. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol

    Heasuk, J., Yunho, L., Mijin, K., Seungjoo, K. & Dongho, W., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 618-621 4 p. 5331801. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Protection profile for connected interoperable DRM framework

    Choi, D., Cho, S., Won, D. & Kim, S., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 320-332 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security specification for conversion technologies of heterogeneous drm systems

    Jo, H., Jeon, W., Lee, Y., Kim, S. & Won, D., 2009, Information Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings. p. 159-170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5451 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security weakness in a provable secure authentication protocol given forward secure session key

    Kim, M., Jo, H., Kim, S. & Won, D., 2009, Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings. PART 2 ed. p. 204-211 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5593 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Smart card based AKE protocol using biometric information in pervasive computing environments

    Yi, W., Kim, S. & Won, D., 2009, Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings. PART 2 ed. p. 182-190 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5593 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Weaknesses and improvements of Kuo-Lee's one-time password authentication scheme

    Kim, M., Lee, B., Kim, S. & Won, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 421-430 10 p. (Communications in Computer and Information Science; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    Enforcing security in mobile RFID networks: Multilateral approaches and solutions

    Park, N., Choi, D., Kim, S. & Won, D., 2008, NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services. p. 999-1002 4 p. 4575267. (NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • How to trust DRE voting machines preserving voter privacy

    Lee, Y., Kim, S. & Won, D., 2008, IEEE International Conference on e-Business Engineering, ICEBE'08 - Workshops: AiR'08, EM2I'08, SOAIC'08, SOKM'08, BIMA'08, DKEEE'08. p. 302-307 6 p. 4690630. (IEEE International Conference on e-Business Engineering, ICEBE'08 - Workshops: AiR'08, EM2I'08, SOAIC'08, SOKM'08, BIMA'08, DKEEE'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The vulnerabilities analysis of fuzzy vault using password

    Hong, S., Jeon, W., Kim, S., Won, D. & Park, C., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 and BSBT 2008: 2008 International Conference on Bio-Science and Bio-Technology. p. 76-83 8 p. 4734284. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 and BSBT 2008: 2008 International Conference on Bio-Science and Bio-Technology; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • 2007

    A countermeasure of fake root key installation using one-time hash chain

    Younggyo, L., Jeonghee, A., Seungjoo, K. & Dongho, W., 2007, Agent and Multi-Agent Systems: Technologies and Applications - First KES International Symposium, KES-AMSTA 2007, Proceedings. p. 1007-1016 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4496 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient and secure rights sharing method for DRM system against replay attack

    Choi, D., Lee, Y., Kang, H., Kim, S. & Won, D., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 135-145 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient password-authenticated key exchange based on RSA

    Park, S., Nam, J., Kim, S. & Won, D., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 309-323 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Efficient RFID authentication protocol for minimizing RFID tag computation

    Rhee, K., Kwak, J., Yi, W. S., Park, C., Park, S., Yang, H., Kim, S. & Won, D., 2007, Advances in Hybrid Information Technology - First International Conference, ICHIT 2006, Revised Selected Papers. Springer Verlag, p. 607-616 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4413 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis on the authentication mechanisms of Korean popular messengers

    Shin, D., Choi, Y., Lee, Y., Park, S., Kim, S. & Won, D., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 547-552 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Vulnerability analysis of secure USB flash drives

    Jeong, H., Choi, Y., Jeon, W., Yang, F., Lee, Y., Kim, S. & Won, D., 2007, 17th IEEE International Workshop on Memory Technology, Design, and Testing, MTDT 2007. p. 61-64 4 p. 4547620. (Records of the IEEE International Workshop on Memory Technology, Design and Testing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • 2006

    An RFID system based MCLT system with improved privacy

    Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • A PKI system for detecting the exposure of a user's secret key

    Lee, Y., Ahn, J., Kim, S. & Won, D., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 248-250 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Confidence value based multi levels of authentication for ubiquitous computing environment

    Zheng, H., Kwak, J., Son, K., Lee, W., Kim, S. & Won, D., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 954-963 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Group key agreement protocol among mobile devices in different cells

    Kim, J., Kim, S., Chun, K., Lee, J. & Won, D., 2006, Frontiers of High Performance Computing and Networking - ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Proceedings. p. 1090-1097 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4331 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis and implementation leveraging globally networked RFIDs

    Park, N., Kim, S., Won, D. & Kim, H., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 494-505 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    31 Citations (Scopus)
  • Security techniques based on EPC Gen2 tag for secure mobile RFID network services

    Namje, P., Jin, K., Seungjoo, K., Dongho, W. & Howon, K., 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 924-934 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4251 LNAI - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Two efficient and secure authentication schemes using smart cards

    Lee, Y., Nam, J., Kim, S. & Won, D., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part V. Springer Verlag, p. 858-866 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3984 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • WIPI mobile platform with secure service for mobile RFID network environment

    Park, N., Kwak, J., Kim, S., Won, D. & Kim, H., 2006, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings. p. 741-748 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3842 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    135 Citations (Scopus)
  • 2005

    A method for deciding quantization steps in QIM watermarking schemes

    Lee, Y., Lee, K., Kim, S., Won, D. & Yang, H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 965-975 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • A method for detecting the exposure of OCSP responder's session private key in D-OCSP-KIS

    Lee, Y., Kim, I., Kim, S. & Won, D., 2005, Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Revised Selected Papers. Springer Verlag, p. 215-226 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3545 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • RFID system with fairness within the framework of security and privacy

    Kwak, J., Rhee, K., Oh, S., Kim, S. & Won, D., 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 142-152 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Secure and efficient ID-based group key agreement fitted for Pay-TV

    Kim, H., Nam, J., Kim, S. & Won, D., 2005, Advances in Mulitmedia Information Processing - PCM 2005 - 6th Pacific Rim Conference on Multimedia, Proceedings. Springer Verlag, p. 117-128 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3768 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)