Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kwangjo Kim
@inproceedings{DBLP:conf/icisc/Kim23, author = {Kwangjo Kim}, editor = {Hwajeong Seo and Suhri Kim}, title = {Theoretical and Empirical Analysis of {FALCON} and {SOLMAE} Using Their Python Implementation}, booktitle = {Information Security and Cryptology - {ICISC} 2023 - 26th International Conference on Information Security and Cryptology, {ICISC} 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14562}, pages = {235--260}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1238-0\_13}, doi = {10.1007/978-981-97-1238-0\_13}, timestamp = {Wed, 13 Mar 2024 19:10:54 +0100}, biburl = {https://dblp.org/rec/conf/icisc/Kim23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AminantoWATYK22, author = {Muhamad Erza Aminanto and R. Satrio Hariomurti Wicaksono and Achmad Eriza Aminanto and Harry Chandra Tanuwidjaja and Lin Yola and Kwangjo Kim}, title = {Multi-Class Intrusion Detection Using Two-Channel Color Mapping in {IEEE} 802.11 Wireless Network}, journal = {{IEEE} Access}, volume = {10}, pages = {36791--36801}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3164104}, doi = {10.1109/ACCESS.2022.3164104}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AminantoWATYK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/KimT21, author = {Kwangjo Kim and Harry Chandra Tanuwidjaja}, title = {Privacy-Preserving Deep Learning - {A} Comprehensive Survey}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-3764-3}, doi = {10.1007/978-981-16-3764-3}, isbn = {978-981-16-3763-6}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/KimT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChoiHHBKK20, author = {Rakyong Choi and Dongyeon Hong and Seongho Han and Seunggeun Baek and Wooseok Kang and Kwangjo Kim}, title = {Design and Implementation of Constant-Round Dynamic Group Key Exchange from {RLWE}}, journal = {{IEEE} Access}, volume = {8}, pages = {94610--94630}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2993296}, doi = {10.1109/ACCESS.2020.2993296}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChoiHHBKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/OpareK20, author = {Edwin Ayisi Opare and Kwangjo Kim}, title = {A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures}, journal = {{IEEE} Access}, volume = {8}, pages = {110810--110847}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3001970}, doi = {10.1109/ACCESS.2020.3001970}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/OpareK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TanuwidjajaCBK20, author = {Harry Chandra Tanuwidjaja and Rakyong Choi and Seunggeun Baek and Kwangjo Kim}, title = {Privacy-Preserving Deep Learning on Machine Learning as a Service - a Comprehensive Survey}, journal = {{IEEE} Access}, volume = {8}, pages = {167425--167447}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3023084}, doi = {10.1109/ACCESS.2020.3023084}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TanuwidjajaCBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/Kim20a, author = {Kwangjo Kim}, title = {Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {7}, pages = {1433--1447}, year = {2020}, url = {https://doi.org/10.1587/transinf.2019ICI0001}, doi = {10.1587/TRANSINF.2019ICI0001}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicetd/Kim20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiHK20, author = {Rakyong Choi and Dongyeon Hong and Kwangjo Kim}, title = {Constant-round Dynamic Group Key Exchange from {RLWE} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2020}, url = {https://eprint.iacr.org/2020/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkPKK19, author = {Jaemin Park and Sungjin Park and Brent ByungHoon Kang and Kwangjo Kim}, title = {eMotion: An {SGX} extension for migrating enclaves}, journal = {Comput. Secur.}, volume = {80}, pages = {173--185}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.09.008}, doi = {10.1016/J.COSE.2018.09.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkPKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeKLK19, author = {Jeeun Lee and Sungsook Kim and Seunghyun Lee and Kwangjo Kim}, title = {Post-Quantum Security of {IGE} Mode Encryption in Telegram}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {1}, pages = {148--151}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.148}, doi = {10.1587/TRANSFUN.E102.A.148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeKLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/TanuwidjajaCK19, author = {Harry Chandra Tanuwidjaja and Rakyong Choi and Kwangjo Kim}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Survey on Deep Learning Techniques for Privacy-Preserving}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {29--46}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_4}, doi = {10.1007/978-3-030-30619-9\_4}, timestamp = {Tue, 27 Sep 2022 14:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/TanuwidjajaCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/KimAT18, author = {Kwangjo Kim and Muhamad Erza Aminanto and Harry Chandra Tanuwidjaja}, title = {Network Intrusion Detection using Deep Learning - {A} Feature Learning Approach}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-1444-5}, doi = {10.1007/978-981-13-1444-5}, isbn = {978-981-13-1443-8}, timestamp = {Fri, 28 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/KimAT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AminantoCTYK18, author = {Muhamad Erza Aminanto and Rakyong Choi and Harry Chandra Tanuwidjaja and Paul D. Yoo and Kwangjo Kim}, title = {Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {621--636}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2762828}, doi = {10.1109/TIFS.2017.2762828}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AminantoCTYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AnCK18, author = {Hyeongcheol An and Rakyong Choi and Kwangjo Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Blockchain-Based Decentralized Key Management System with Quantum Resistance}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {229--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_18}, doi = {10.1007/978-3-030-17982-3\_18}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AnCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Kim17, author = {Kwangjo Kim}, title = {\emph{Cryptography}: {A} New Open Access Journal}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {1}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010001}, doi = {10.3390/CRYPTOGRAPHY1010001}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Kim17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AminantoKKK17, author = {Muhamad Erza Aminanto and Hakju Kim and Kyung{-}Min Kim and Kwangjo Kim}, title = {Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {176--183}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.176}, doi = {10.1587/TRANSFUN.E100.A.176}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AminantoKKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KobayashiYYNHKO17, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, title = {Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {12}, pages = {2991--3006}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.2991}, doi = {10.1587/TRANSFUN.E100.A.2991}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/KobayashiYYNHKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbis/KimA17, author = {Kwangjo Kim and Muhamad Erza Aminanto}, title = {Deep learning in intrusion detection perspective: Overview and further challenges}, booktitle = {International Workshop on Big Data and Information Security, {IWBIS} 2017, Jakarta, Indonesia, September 23-24, 2017}, pages = {5--10}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IWBIS.2017.8275095}, doi = {10.1109/IWBIS.2017.8275095}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwbis/KimA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbis/AminantoTYK17, author = {Muhamad Erza Aminanto and Harry Chandra Tanuwidjaja and Paul D. Yoo and Kwangjo Kim}, title = {Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier}, booktitle = {International Workshop on Big Data and Information Security, {IWBIS} 2017, Jakarta, Indonesia, September 23-24, 2017}, pages = {99--104}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IWBIS.2017.8275109}, doi = {10.1109/IWBIS.2017.8275109}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwbis/AminantoTYK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ParkK17, author = {Jaemin Park and Kwangjo Kim}, title = {TM-Coin: Trustworthy management of {TCB} measurements in IoT}, booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March 13-17, 2017}, pages = {654--659}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PERCOMW.2017.7917640}, doi = {10.1109/PERCOMW.2017.7917640}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/ParkK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AminantoK17, author = {Muhamad Erza Aminanto and Kwangjo Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {212--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_18}, doi = {10.1007/978-3-319-93563-8\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AminantoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerjpre/LiuK17, author = {Yi Liu and Kwangjo Kim}, title = {Understanding Web 2.0 service models, applications, reflections, perspectives, and beyond}, journal = {PeerJ Prepr.}, volume = {5}, pages = {e2811}, year = {2017}, url = {https://doi.org/10.7287/peerj.preprints.2811v1}, doi = {10.7287/PEERJ.PREPRINTS.2811V1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerjpre/LiuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/Al-JarrahAYMTK16, author = {Omar Y. Al{-}Jarrah and Omar Alhussein and Paul D. Yoo and Sami Muhaidat and Kamal Taha and Kwangjo Kim}, title = {Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection}, journal = {{IEEE} Trans. Cybern.}, volume = {46}, number = {8}, pages = {1796--1806}, year = {2016}, url = {https://doi.org/10.1109/TCYB.2015.2490802}, doi = {10.1109/TCYB.2015.2490802}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/Al-JarrahAYMTK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/KimKK16, author = {Jong Myoung Kim and Zae Myung Kim and Kwangjo Kim}, title = {An approach to spam comment detection through domain-independent features}, booktitle = {2016 International Conference on Big Data and Smart Computing, BigComp 2016, Hong Kong, China, January 18-20, 2016}, pages = {273--276}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BIGCOMP.2016.7425926}, doi = {10.1109/BIGCOMP.2016.7425926}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigcomp/KimKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/DoJCK16, author = {Hyo Jin Do and Young{-}Seob Jeong and Ho{-}Jin Choi and Kwangjo Kim}, title = {Another dummy generation technique in location-based services}, booktitle = {2016 International Conference on Big Data and Smart Computing, BigComp 2016, Hong Kong, China, January 18-20, 2016}, pages = {532--538}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BIGCOMP.2016.7425987}, doi = {10.1109/BIGCOMP.2016.7425987}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigcomp/DoJCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/TsuchidaNOK16, author = {Hikaru Tsuchida and Takashi Nishide and Eiji Okamoto and Kwangjo Kim}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Revocable Decentralized Multi-Authority Functional Encryption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {248--265}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_14}, doi = {10.1007/978-3-319-49890-4\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/TsuchidaNOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AminantoK16, author = {Muhamad Erza Aminanto and Kwangjo Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {136--147}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_12}, doi = {10.1007/978-3-319-56549-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AminantoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2015, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29814-6}, doi = {10.1007/978-3-319-29814-6}, isbn = {978-3-319-29813-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShinK15, author = {Young{-}joo Shin and Kwangjo Kim}, title = {Differentially private client-side data deduplication protocol for cloud storage services}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2114--2123}, year = {2015}, url = {https://doi.org/10.1002/sec.1159}, doi = {10.1002/SEC.1159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShinK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimK15, author = {Hakju Kim and Kwangjo Kim}, title = {Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {110--111}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.24}, doi = {10.1109/ASIAJCIS.2015.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KimK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {39--52}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005539300390052}, doi = {10.5220/0005539300390052}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinK14a, author = {Young{-}joo Shin and Kwangjo Kim}, title = {Efficient and Secure File Deduplication in Cloud Storage}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {2}, pages = {184--197}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.184}, doi = {10.1587/TRANSINF.E97.D.184}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/0001ZSTLK14, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, title = {Identity-based chameleon hashing and signatures without key exposure}, journal = {Inf. Sci.}, volume = {265}, pages = {198--210}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.020}, doi = {10.1016/J.INS.2013.12.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/0001ZSTLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/Al-JarrahSEYMK14, author = {O. Y. Al{-}Jarrah and Amna Siddiqui and M. Elsalamouny and Paul D. Yoo and Sami Muhaidat and Kwangjo Kim}, title = {Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {177--181}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.14}, doi = {10.1109/ICDCSW.2014.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/Al-JarrahSEYMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/KimK13, author = {Jangseong Kim and Kwangjo Kim}, title = {A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {1377--1388}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9650-x}, doi = {10.1007/S11235-011-9650-X}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/KimK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13, author = {Hiroya Takahashi and Kenji Yasunaga and Masahiro Mambo and Kwangjo Kim and Heung Youl Youm}, title = {Preventing Abuse of Cookies Stolen by {XSS}}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {85--89}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.20}, doi = {10.1109/ASIAJCIS.2013.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TakahashiYMKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/HanKCCSS12, author = {Kyusuk Han and Kwangjo Kim and Wook Choi and Hyo Hyun Choi and Jung{-}Taek Seo and Taeshik Shon}, title = {Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {14}, number = {3-4}, pages = {251--269}, year = {2012}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-14-number-3-4-2012/ahswn-14-3-4-p-251-269/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/HanKCCSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZCKW12, author = {Jin Li and Fangguo Zhang and Xiaofeng Chen and Kwangjo Kim and Duncan S. Wong}, title = {Generic security-amplifying methods of ordinary digital signatures}, journal = {Inf. Sci.}, volume = {201}, pages = {128--139}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.03.006}, doi = {10.1016/J.INS.2012.03.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiZCKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/KimKPS12, author = {Jangseong Kim and Kwangjo Kim and Jong Hyuk Park and Taeshik Shon}, title = {A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {45--57}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.01.012}, doi = {10.1016/J.MCM.2011.01.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/KimKPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/KonidalaDKLLKK12, author = {Divyan Munirathnam Konidala and Made Harta Dwijaksara and Kwangjo Kim and Dongman Lee and Byoungcheon Lee and Daeyoung Kim and Soontae Kim}, title = {Resuscitating privacy-preserving mobile payment with customer in complete control}, journal = {Pers. Ubiquitous Comput.}, volume = {16}, number = {6}, pages = {643--654}, year = {2012}, url = {https://doi.org/10.1007/s00779-011-0436-7}, doi = {10.1007/S00779-011-0436-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/KonidalaDKLLKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinHK12, author = {Young{-}joo Shin and Junbeom Hur and Kwangjo Kim}, title = {Security weakness in the Proof of Storage with Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2012}, url = {http://eprint.iacr.org/2012/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChenZTWK11, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Discrete logarithm based chameleon hashing and signatures without key exposure}, journal = {Comput. Electr. Eng.}, volume = {37}, number = {4}, pages = {614--623}, year = {2011}, url = {https://doi.org/10.1016/j.compeleceng.2011.03.011}, doi = {10.1016/J.COMPELECENG.2011.03.011}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ChenZTWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/DucK11, author = {Dang Nguyen Duc and Kwangjo Kim}, title = {Defending {RFID} authentication protocols against DoS attacks}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {384--390}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.06.014}, doi = {10.1016/J.COMCOM.2010.06.014}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/DucK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimSK11, author = {Jangseong Kim and Taeshik Shon and Kwangjo Kim}, title = {Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment}, journal = {{IEICE} Trans. Commun.}, volume = {94-B}, number = {3}, pages = {686--689}, year = {2011}, url = {https://doi.org/10.1587/transcom.E94.B.686}, doi = {10.1587/TRANSCOM.E94.B.686}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanKS11, author = {Kyusuk Han and Kwangjo Kim and Taeshik Shon}, title = {Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {6}, pages = {1181--1184}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.1181}, doi = {10.1587/TRANSINF.E94.D.1181}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanSK11, author = {Kyusuk Han and Taeshik Shon and Kwangjo Kim}, title = {Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security}, journal = {{IEICE} Trans. Commun.}, volume = {94-B}, number = {8}, pages = {2235--2238}, year = {2011}, url = {https://doi.org/10.1587/transcom.E94.B.2235}, doi = {10.1587/TRANSCOM.E94.B.2235}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/HanKPS11, author = {Kyusuk Han and Kwangjo Kim and Jong Hyuk Park and Taeshik Shon}, title = {Efficient sensor node authentication in third generation-wireless sensor networks integrated networks}, journal = {{IET} Commun.}, volume = {5}, number = {12}, pages = {1744--1754}, year = {2011}, url = {https://doi.org/10.1049/iet-com.2010.0539}, doi = {10.1049/IET-COM.2010.0539}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/HanKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/HanYSPK11, author = {Kyusuk Han and Chan Yeob Yeun and Taeshik Shon and Jong Hyuk Park and Kwangjo Kim}, title = {A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication}, journal = {Int. J. Commun. Syst.}, volume = {24}, number = {4}, pages = {461--472}, year = {2011}, url = {https://doi.org/10.1002/dac.1165}, doi = {10.1002/DAC.1165}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/HanYSPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenWZTWLLK11, author = {Xiaofeng Chen and Qianhong Wu and Fangguo Zhang and Haibo Tian and Baodian Wei and Byoungcheon Lee and Hyunrok Lee and Kwangjo Kim}, title = {New receipt-free voting scheme using double-trapdoor commitment}, journal = {Inf. Sci.}, volume = {181}, number = {8}, pages = {1493--1502}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.12.012}, doi = {10.1016/J.INS.2010.12.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenWZTWLLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangSRK11, author = {Qian Wang and Hai Su and Kui Ren and Kwangjo Kim}, title = {Fast and scalable secret key generation exploiting channel phase randomness in wireless networks}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1422--1430}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934929}, doi = {10.1109/INFCOM.2011.5934929}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangSRK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/VoLYK10, author = {Duc{-}Liem Vo and Hyunrok Lee and Chan Yeob Yeun and Kwangjo Kim}, title = {Enhancements of authenticated multiple key exchange protocol based on bilinear pairings}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {155--159}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.08.001}, doi = {10.1016/J.COMPELECENG.2009.08.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/VoLYK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DucK10, author = {Dang Nguyen Duc and Kwangjo Kim}, title = {On the Security of {RFID} Group Scanning Protocols}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {3}, pages = {528--530}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.528}, doi = {10.1587/TRANSINF.E93.D.528}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DucK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiK10, author = {Jin Li and Kwangjo Kim}, title = {Hidden attribute-based signatures without anonymity revocation}, journal = {Inf. Sci.}, volume = {180}, number = {9}, pages = {1681--1689}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2010.01.008}, doi = {10.1016/J.INS.2010.01.008}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HanKS10, author = {Kyusuk Han and Kwangjo Kim and Taeshik Shon}, title = {Untraceable Mobile Node Authentication in {WSN}}, journal = {Sensors}, volume = {10}, number = {5}, pages = {4410--4429}, year = {2010}, url = {https://doi.org/10.3390/s100504410}, doi = {10.3390/S100504410}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/HanSK10, author = {Kyusuk Han and Taeshik Shon and Kwangjo Kim}, title = {Efficient mobile sensor authentication in smart home and {WPAN}}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {56}, number = {2}, pages = {591--596}, year = {2010}, url = {https://doi.org/10.1109/TCE.2010.5505975}, doi = {10.1109/TCE.2010.5505975}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/HanSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenZSTLK10, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Identity-Based Chameleon Hash Scheme without Key Exposure}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {200--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_13}, doi = {10.1007/978-3-642-14081-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanKKS10, author = {Kyusuk Han and Jangseong Kim and Kwangjo Kim and Taeshik Shon}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Efficient sensor node authentication via 3GPP mobile communication networks}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {687--689}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866398}, doi = {10.1145/1866307.1866398}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanKKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KimBKZ10, author = {Jangseong Kim and Joonsang Baek and Kwangjo Kim and Jianying Zhou}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {45--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_4}, doi = {10.1007/978-3-642-22633-5\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/KimBKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenZTWMKK10, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Qianhong Wu and Yi Mu and Jangseong Kim and Kwangjo Kim}, editor = {Radu Sion}, title = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {304--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_23}, doi = {10.1007/978-3-642-14577-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChenZTWMKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DucKY10, author = {Dang Nguyen Duc and Kwangjo Kim and Chan Yeob Yeun}, title = {Reconsidering Ryu-Takagi {RFID} authentication protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678044/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DucKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LvRCK09, author = {Jiqiang Lv and Kui Ren and Xiaofeng Chen and Kwangjo Kim}, title = {The ring authenticated encryption scheme - How to provide a clue wisely}, journal = {Inf. Sci.}, volume = {179}, number = {1-2}, pages = {161--168}, year = {2009}, url = {https://doi.org/10.1016/j.ins.2008.09.014}, doi = {10.1016/J.INS.2008.09.014}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LvRCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/ZaidiHKMGK09, author = {Syed Ali Raza Zaidi and Maryam Hafeez and Syed A. Khayam and Desmond C. McLernon and Mounir Ghogho and Kwangjo Kim}, title = {On minimum cost coverage in wireless sensor networks}, booktitle = {43rd Annual Conference on Information Sciences and Systems, {CISS} 2009, The John Hopkins University, Baltimore, MD, USA, 18-20 March 2009}, pages = {213--218}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISS.2009.5054719}, doi = {10.1109/CISS.2009.5054719}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/ZaidiHKMGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DucLKK09, author = {Dang Nguyen Duc and Hyunrok Lee and Divyan M. Konidala and Kwangjo Kim}, title = {Open issues in {RFID} security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402510}, doi = {10.1109/ICITST.2009.5402510}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DucLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/ParkKK09, author = {Hyewon Park and Zeen Kim and Kwangjo Kim}, editor = {Rainer Falk and Wilson Goudalo and Eric Y. Chen and Reijo Savola and Manuela Popescu}, title = {Forward Secure ID-Based Group Key Agreement Protocol with Anonymity}, booktitle = {The Third International Conference on Emerging Security Information, Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada, Greece}, pages = {274--279}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SECURWARE.2009.49}, doi = {10.1109/SECURWARE.2009.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/ParkKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wts/MunHK09, author = {Hyeran Mun and Kyusuk Han and Kwangjo Kim}, title = {3G-WLAN interworking: security analysis and new authentication and key agreement based on {EAP-AKA}}, booktitle = {2009 Wireless Telecommunications Symposium, {WTS} 2009, Prague, Czech Republic, April 22-24, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WTS.2009.5068983}, doi = {10.1109/WTS.2009.5068983}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wts/MunHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZTWK09, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2009}, url = {http://eprint.iacr.org/2009/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZTWK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiRK09, author = {Jin Li and Kui Ren and Kwangjo Kim}, title = {{A2BE:} Accountable Attribute-Based Encryption for Abuse Free Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2009}, url = {http://eprint.iacr.org/2009/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiRK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZTK09, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim}, title = {Identity-Based Chameleon Hash Scheme Without Key Exposure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2009}, url = {http://eprint.iacr.org/2009/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZTK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucK09, author = {Dang Nguyen Duc and Kwangjo Kim}, title = {Grouping-Proof Protocol for {RFID} Tags: Security Definition and Scalable Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2009}, url = {http://eprint.iacr.org/2009/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucK09a, author = {Dang Nguyen Duc and Kwangjo Kim}, title = {Security Analysis of {A} Remote User Authentication Protocol by Liao and Wang}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2009}, url = {http://eprint.iacr.org/2009/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/VoK08, author = {Duc{-}Liem Vo and Kwangjo Kim}, title = {A secure mutual authentication scheme with key agreement using smart card from bilinear pairings}, journal = {Comput. Syst. Sci. Eng.}, volume = {23}, number = {3}, year = {2008}, timestamp = {Thu, 23 Aug 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/VoK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenZTWSMLK08, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Willy Susilo and Yi Mu and Hyunrok Lee and Kwangjo Kim}, title = {Efficient generic on-line/off-line (threshold) signatures without key exposure}, journal = {Inf. Sci.}, volume = {178}, number = {21}, pages = {4192--4203}, year = {2008}, url = {https://doi.org/10.1016/j.ins.2008.06.022}, doi = {10.1016/J.INS.2008.06.022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenZTWSMLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YeunHVK08, author = {Chan Yeob Yeun and Kyusuk Han and Duc{-}Liem Vo and Kwangjo Kim}, title = {Secure authenticated group key agreement protocol in the {MANET} environment}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {158--164}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.002}, doi = {10.1016/J.ISTR.2008.10.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YeunHVK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiKZW08, author = {Jin Li and Kwangjo Kim and Fangguo Zhang and Duncan S. Wong}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Generic Security-Amplifying Methods of Ordinary Digital Signatures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_14}, doi = {10.1007/978-3-540-68914-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiKZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiK08, author = {Jin Li and Kwangjo Kim}, title = {Attribute-Based Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2008}, url = {http://eprint.iacr.org/2008/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/VoK07, author = {Duc{-}Liem Vo and Kwangjo Kim}, title = {Security Analysis of an ID-Based Key Agreement for Peer Group Communication}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {11}, pages = {2624--2625}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.11.2624}, doi = {10.1093/IETFEC/E90-A.11.2624}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/VoK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HeoKK07, author = {Sungchul Heo and Zeen Kim and Kwangjo Kim}, title = {Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {464--468}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.93}, doi = {10.1109/GLOCOM.2007.93}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HeoKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimKK07, author = {Jangseong Kim and Zeen Kim and Kwangjo Kim}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {37--48}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_4}, doi = {10.1007/978-3-540-76788-6\_4}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiYK07, author = {Jin Li and Tsz Hon Yuen and Kwangjo Kim}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {Practical Threshold Signatures Without Random Oracles}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {198--207}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_14}, doi = {10.1007/978-3-540-75670-5\_14}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiYK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiKZC07, author = {Jin Li and Kwangjo Kim and Fangguo Zhang and Xiaofeng Chen}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {208--217}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_15}, doi = {10.1007/978-3-540-75670-5\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LiKZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/RenLKD06, author = {Kui Ren and Wenjing Lou and Kwangjo Kim and Robert H. Deng}, title = {A novel privacy preserving authentication and access control scheme for pervasive computing environments}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {55}, number = {4}, pages = {1373--1384}, year = {2006}, url = {https://doi.org/10.1109/TVT.2006.877704}, doi = {10.1109/TVT.2006.877704}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/RenLKD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/SeoLK06, author = {Youngjoon Seo and Hyunrok Lee and Kwangjo Kim}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {A Scalable and Untraceable Authentication Protocol for {RFID}}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {252--261}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_26}, doi = {10.1007/11807964\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/SeoLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KonidalaK06, author = {Divyan M. Konidala and Kwangjo Kim}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Mobile {RFID} Applications and Security Challenges}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {194--205}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_17}, doi = {10.1007/11927587\_17}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KonidalaK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ZhangK05, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Lee-Hwang-Li's key authentication scheme}, journal = {Appl. Math. Comput.}, volume = {161}, number = {1}, pages = {101--107}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2003.12.012}, doi = {10.1016/J.AMC.2003.12.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/ZhangK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LvWK05, author = {Jiqiang Lv and Xinmei Wang and Kwangjo Kim}, title = {Security of a multisignature scheme for specified group of verifiers}, journal = {Appl. Math. Comput.}, volume = {166}, number = {1}, pages = {58--63}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.04.108}, doi = {10.1016/J.AMC.2004.04.108}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/LvWK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LvWK05a, author = {Jiqiang Lv and Xinmei Wang and Kwangjo Kim}, title = {Practical convertible authenticated encryption schemes using self-certified public keys}, journal = {Appl. Math. Comput.}, volume = {169}, number = {2}, pages = {1285--1297}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.10.057}, doi = {10.1016/J.AMC.2004.10.057}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/LvWK05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/VoK05, author = {Duc{-}Liem Vo and Kwangjo Kim}, editor = {Dongho Won and Seungjoo Kim}, title = {Yet Another Forward Secure Signature from Bilinear Pairings}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {441--455}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_34}, doi = {10.1007/11734727\_34}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/VoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ParkKK05, author = {Jaemin Park and Zeen Kim and Kwangjo Kim}, title = {State-based key management scheme for wireless sensor networks}, booktitle = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MAHSS.2005.1542877}, doi = {10.1109/MAHSS.2005.1542877}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ParkKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/KonidalaDLK05, author = {Divyan M. Konidala and Dang Nguyen Duc and Dongman Lee and Kwangjo Kim}, title = {A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments}, booktitle = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}}, pages = {136--140}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PERCOMW.2005.3}, doi = {10.1109/PERCOMW.2005.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/KonidalaDLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RenLWBDK04, author = {Kui Ren and Tieyan Li and Zhiguo Wan and Feng Bao and Robert H. Deng and Kwangjo Kim}, title = {Highly reliable trust establishment scheme in ad hoc networks}, journal = {Comput. Networks}, volume = {45}, number = {6}, pages = {687--699}, year = {2004}, url = {https://doi.org/10.1016/j.comnet.2004.01.008}, doi = {10.1016/J.COMNET.2004.01.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RenLWBDK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MinYK04, author = {SungJun Min and Go Yamamoto and Kwangjo Kim}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Weak Property of Malleability in NTRUSign}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {379--390}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_33}, doi = {10.1007/978-3-540-27800-9\_33}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MinYK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenZK04, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Limited Verifier Signature from Bilinear Pairings}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {135--148}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_10}, doi = {10.1007/978-3-540-24852-1\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ChenZK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/LeeBDKYY04, author = {Byoungcheon Lee and Colin Boyd and Ed Dawson and Kwangjo Kim and Jeongmo Yang and Seungjae Yoo}, editor = {James M. Hogan and Paul Montague and Martin K. Purvis and Chris Steketee}, title = {Secure Key Issuing in ID-based Cryptography}, booktitle = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand, January 2004}, series = {{CRPIT}}, volume = {32}, pages = {69--74}, publisher = {Australian Computer Society}, year = {2004}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Lee.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/LeeBDKYY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LeeHKKI04, author = {Songwon Lee and Kyusuk Han and Seok{-}kyu Kang and Kwangjo Kim and So Ran Ine}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Threshold Password-Based Authentication Using Bilinear Pairings}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {350--363}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_29}, doi = {10.1007/978-3-540-25980-0\_29}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/LeeHKKI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KonidalaYK04, author = {Divyan M. Konidala and Chan Yeob Yeun and Kwangjo Kim}, title = {A secure and privacy enhanced protocol for location-based services in ubiquitous society}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2164--2168}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378393}, doi = {10.1109/GLOCOM.2004.1378393}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/KonidalaYK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/RenLHPK04, author = {Kui Ren and Hyunrok Lee and Kyusuk Han and Jaemin Park and Kwangjo Kim}, editor = {Hung Keng Pung and Francis Bu{-}Sung Lee and Chen{-}Kong Tham and Saira Kuttan}, title = {An enhanced lightweight authentication protocol for access control in wireless LANs}, booktitle = {12th {IEEE} International Conference on Networks, {ICON} 2004, Singapore, November 16-19 2004}, pages = {444--450}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICON.2004.1409206}, doi = {10.1109/ICON.2004.1409206}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icon/RenLHPK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChenZKK04, author = {Xiaofeng Chen and Fangguo Zhang and Divyan M. Konidala and Kwangjo Kim}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {New ID-Based Threshold Signature Scheme from Bilinear Pairings}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {371--383}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_29}, doi = {10.1007/978-3-540-30556-9\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ChenZKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenZK04, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, editor = {Kan Zhang and Yuliang Zheng}, title = {Chameleon Hashing Without Key Exposure}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {87--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_8}, doi = {10.1007/978-3-540-30144-8\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChenZK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RenLKY04, author = {Kui Ren and Hyunrok Lee and Kwangjo Kim and Taewhan Yoo}, editor = {Chae Hoon Lim and Moti Yung}, title = {Efficient Authenticated Key Agreement Protocol for Dynamic Groups}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {144--159}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_13}, doi = {10.1007/978-3-540-31815-6\_13}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RenLKY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZK04, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, title = {Chameleon Hashing without Key Exposure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2004}, url = {http://eprint.iacr.org/2004/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, title = {A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {2}, pages = {515--516}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_2\_515}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NarayananRK03, author = {Arvind Narayanan and C. Pandu Rangan and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Practical Pay {TV} Schemes}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {192--203}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_17}, doi = {10.1007/3-540-45067-X\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {312--323}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_27}, doi = {10.1007/3-540-45067-X\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LeeKKR03, author = {Sangwon Lee and Yongdae Kim and Kwangjo Kim and DaeHyun Ryu}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {An Efficient Tree-Based Group Key Agreement Using Bilinear Map}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {357--371}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_28}, doi = {10.1007/978-3-540-45203-4\_28}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LeeKKR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ChoiK03, author = {SuGil Choi and Kwangjo Kim}, title = {Authentication and payment protocol preserving location privacy in mobile {IP}}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {1410--1414}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258470}, doi = {10.1109/GLOCOM.2003.1258470}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ChoiK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DucCK03, author = {Dang Nguyen Duc and Jung Hee Cheon and Kwangjo Kim}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {A Forward-Secure Blind Signature Scheme Based on the Strong {RSA} Assumption}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {11--21}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_2}, doi = {10.1007/978-3-540-39927-8\_2}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/DucCK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XieZCK03, author = {Yan Xie and Fangguo Zhang and Xiaofeng Chen and Kwangjo Kim}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {ID-Based Distributed "Magic Ink" Signature from Pairings}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {249--259}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_23}, doi = {10.1007/978-3-540-39927-8\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/XieZCK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeBDKYY03, author = {Byoungcheon Lee and Colin Boyd and Ed Dawson and Kwangjo Kim and Jeongmo Yang and Seungjae Yoo}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Providing Receipt-Freeness in Mixnet-Based Voting Protocols}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {245--258}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_19}, doi = {10.1007/978-3-540-24691-6\_19}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LeeBDKYY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenLK03, author = {Xiaofeng Chen and Byoungcheon Lee and Kwangjo Kim}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {259--273}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_20}, doi = {10.1007/978-3-540-24691-6\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChenLK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/VinodNSRK03, author = {Vinod Vaikuntanathan and Arvind Narayanan and K. Srinathan and C. Pandu Rangan and Kwangjo Kim}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {On the Power of Computational Secret Sharing}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {162--176}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_12}, doi = {10.1007/978-3-540-24582-7\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/VinodNSRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiKK03, author = {SuGil Choi and Kwangjo Kim and ByeongGon Kim}, editor = {Kijoon Chae and Moti Yung}, title = {Practical Solution for Location Privacy in Mobile IPv6}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {69--83}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_6}, doi = {10.1007/978-3-540-24591-9\_6}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2003}, url = {http://eprint.iacr.org/2003/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZK03, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, title = {A New ID-based Group Signature Scheme from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2003}, url = {http://eprint.iacr.org/2003/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/LeeAKPLKL02, author = {Manho Lee and Gookwhan Ahn and Jinho Kim and Jaegwan Park and Byoungcheon Lee and Kwangjo Kim and Hyuckjae Lee}, title = {Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem}, journal = {J. Commun. Networks}, volume = {4}, number = {2}, pages = {81--89}, year = {2002}, url = {https://doi.org/10.1109/JCN.2002.6596898}, doi = {10.1109/JCN.2002.6596898}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/LeeAKPLKL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLK02, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {203--213}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_17}, doi = {10.1007/3-540-45450-0\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimK02, author = {Myungsun Kim and Kwangjo Kim}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {362--378}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_28}, doi = {10.1007/3-540-45450-0\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhangK02, author = {Fangguo Zhang and Kwangjo Kim}, editor = {Yuliang Zheng}, title = {ID-Based Blind Signature and Ring Signature from Pairings}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {533--547}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_33}, doi = {10.1007/3-540-36178-2\_33}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhangK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimKK02, author = {Myungsun Kim and Jongseong Kim and Kwangjo Kim}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {97--108}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_9}, doi = {10.1007/3-540-36159-6\_9}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/KimKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeK02, author = {Byoungcheon Lee and Kwangjo Kim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {389--406}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_27}, doi = {10.1007/3-540-36552-4\_27}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LeeK02, author = {Byoungcheon Lee and Kwangjo Kim}, editor = {Alfred Menezes and Palash Sarkar}, title = {Self-certified Signatures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {199--214}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_17}, doi = {10.1007/3-540-36231-2\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LeeK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2001, editor = {Kwangjo Kim}, title = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45861-1}, doi = {10.1007/3-540-45861-1}, isbn = {3-540-43319-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLK02, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, title = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2002}, url = {http://eprint.iacr.org/2002/122}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangK02, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Two New Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2002}, url = {http://eprint.iacr.org/2002/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLK02a, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, title = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2002}, url = {http://eprint.iacr.org/2002/178}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLK02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhnK01, author = {Gail{-}Joon Ahn and Kwangjo Kim}, title = {{CONUGA:} Constrained User-Group Assignment}, journal = {J. Netw. Comput. Appl.}, volume = {24}, number = {2}, pages = {87--100}, year = {2001}, url = {https://doi.org/10.1006/jnca.2000.0125}, doi = {10.1006/JNCA.2000.0125}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhnK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeKK01, author = {Byoungcheon Lee and Heesun Kim and Kwangjo Kim}, editor = {Vijay Varadharajan and Yi Mu}, title = {Secure Mobile Agent Using Strong Non-designated Proxy Signature}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {474}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_37}, doi = {10.1007/3-540-47719-5\_37}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeKK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CheonKKLK01, author = {Jung Hee Cheon and MunJu Kim and Kwangjo Kim and Jung{-}Yeun Lee and SungWoo Kang}, editor = {Kwangjo Kim}, title = {Improved Impossible Differential Cryptanalysis of Rijndael and Crypton}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {39--49}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_4}, doi = {10.1007/3-540-45861-1\_4}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/CheonKKLK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimKL01, author = {Jinho Kim and Kwangjo Kim and Chulsoo Lee}, editor = {Kwangjo Kim}, title = {An Efficient and Provably Secure Threshold Blind Signature}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {318--327}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_24}, doi = {10.1007/3-540-45861-1\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimKL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LeeKM01, author = {Byoungcheon Lee and Kwangjo Kim and Joongsoo Ma}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Efficient Public Auction with One-Time Registration and Public Verifiability}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {162--174}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_16}, doi = {10.1007/3-540-45311-3\_16}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LeeKM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2001, editor = {Kwangjo Kim}, title = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2}, doi = {10.1007/3-540-44586-2}, isbn = {3-540-41658-7}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaekLK00, author = {Joonsang Baek and Byoungcheon Lee and Kwangjo Kim}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {49--58}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_5}, doi = {10.1007/10718964\_5}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaekLK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeK00, author = {Byoungcheon Lee and Kwangjo Kim}, editor = {Dongho Won}, title = {Secure Matchmaking Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2015}, pages = {123--134}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45247-8\_10}, doi = {10.1007/3-540-45247-8\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SongK00, author = {Boyeon Song and Kwangjo Kim}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {237--249}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_21}, doi = {10.1007/3-540-44495-5\_21}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SongK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/AhnKY00, author = {Gookwhan Ahn and Kwangjo Kim and Hee Yong Youn}, title = {Tapping Alert Protocol}, booktitle = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg, MD, {USA}}, pages = {159--164}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ENABL.2000.883721}, doi = {10.1109/ENABL.2000.883721}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/AhnKY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SeoK99, author = {Moonseog Seo and Kwangjo Kim}, editor = {JooSeok Song}, title = {Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {269--277}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_21}, doi = {10.1007/10719994\_21}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SeoK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/KimPB99, author = {Kwangjo Kim and Sangjoon Park and Joonsang Baek}, title = {Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol}, booktitle = {Proceedings of the 1999 International Conference on Parallel Processing Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999}, pages = {140--145}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICPPW.1999.800053}, doi = {10.1109/ICPPW.1999.800053}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/KimPB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ParkLSK97, author = {Sung{-}Mo Park and Sangjin Lee and Soo Hak Sung and Kwangjo Kim}, title = {Improving Bounds for the Number of Correlation Immune Boolean Functions}, journal = {Inf. Process. Lett.}, volume = {61}, number = {4}, pages = {209--212}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00010-0}, doi = {10.1016/S0020-0190(97)00010-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ParkLSK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ParkPKW97, author = {Sangjoon Park and Sangwoo Park and Kwangjo Kim and Dongho Won}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Two efficient {RSA} multisignature schemes}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {217--222}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028477}, doi = {10.1007/BFB0028477}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/ParkPKW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/1996, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034829}, doi = {10.1007/BFB0034829}, isbn = {3-540-61872-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CheeLK94, author = {Seongtaek Chee and Sangjin Lee and Kwangjo Kim}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Semi-bent Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {107--118}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000428}, doi = {10.1007/BFB0000428}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CheeLK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Kim91, author = {Kwangjo Kim}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the {SAC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {59--72}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_5}, doi = {10.1007/3-540-57332-1\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Kim91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimMI90, author = {Kwangjo Kim and Tsutomu Matsumoto and Hideki Imai}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {564--574}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_39}, doi = {10.1007/3-540-38424-3\_39}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimMI90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.