Researcher Page

사진

Kim, Kwangjo (김광조) C-1741-2011

Department
School of Computing(전산학부)
Co-author
Collaboration Network Collaboration Network
Website
http://caislab.kaist.ac.kr/kkjHomePage
Research Area
Authentication, Network Security, Industrial Security, SCADA security

Keyword Cloud

Reload 더보기
1

Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

Sami Muhaidat; Omar Y. Al-Jarrah; Taha, K.; Paul D. Yoo; Omar Alhussein; Kim, KwangjoresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08

2

Differentially private client-side data deduplication protocol for cloud storage services

Kim, Kwangjoresearcher; Shin, YoungjooWILEY-BLACKWELLSECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

3

Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework

Yoo, Paul D.; Huseynov, Khalid; 김광조researcher한국정보보호학회정보보호학회논문지, v.25, no.4, pp.807 - 816, 2015-08

4

조직의 실시간 보안관리 체계 확립을 위한 ‘인터페이스 보안’ 강화에 대한 연구

김소라; 김광조researcher; 임채호; 박준정; 안수현한국정보처리학회정보처리학회논문지. 컴퓨터 및 통신시스템, v.4, no.5, pp.171 - 176, 2015-05

5

Identity-based chameleon hashing and signatures without key exposure

Tian, Haibo; Chen, Xiaofeng; Li, Jin; Zhang, Fangguo; Susilo, Willy; Kim, KwangjoresearcherELSEVIER SCIENCE INCINFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

6

escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구

김광조researcher; 이동수한국정보보호학회한국정보보호학회지, v.24, no.2, pp.7 - 20, 2014-04

7

Efficient and Secure File Deduplication in Cloud Storage

Kim, Kwangjoresearcher; Shin, YoungjooIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

8

A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks

Kim, Jang-Seong; Kim, Kwang-JoresearcherSPRINGERTELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1377 - 1388, 2013-02

9

Generic security-amplifying methods of ordinary digital signatures

Li, Jin; Kim, Kwangjoresearcher; Wong, Duncan S.; Chen, Xiaofeng; Zhang, FangguoELSEVIER SCIENCE INCINFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10

10

Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Choi, Hyo Hyun; Kim, Kwangjoresearcher; Shon, Taeshik; Choi, Wook; Seo, Jungtaek; Han, KyusukOLD CITY PUBLISHING INCAD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

11

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment

Shon, Tae-Shik; Kim, Kwang-Joresearcher; Kim, Jang-Seong; Park, Jong-HyukPERGAMON-ELSEVIER SCIENCE LTDMATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.45 - 57, 2012-01

12

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

Han, Kyusuk; Shon, Taeshik; Kim, KwangjoresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.8, pp.2235 - 2238, 2011-08

13

Discrete logarithm based chameleon hashing and signatures without key exposure

Tian, Haibo; Zhang, Fangguo; Kim, Kwangjoresearcher; Chen, Xiaofeng; Wei, BaodianPERGAMON-ELSEVIER SCIENCE LTDCOMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623, 2011-07

14

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

Kim, Kwang-Joresearcher; Han, Kyu-Suk; Shon, Tae-ShikIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E94D, no.6, pp.1181 - 1184, 2011-06

15

New receipt-free voting scheme using double-trapdoor commitment

Wu, Qianhong; Kim, Kwang-Joresearcher; Chen, Xiaofeng; Lee, Byoung-Cheon; Zhang, Fangguo; Tian, Haibo; Lee, Hyun-Rok; Wei, BaodianELSEVIER SCIENCE INCINFORMATION SCIENCES, v.181, no.8, pp.1493 - 1502, 2011-04

16

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Kim, Kwangjoresearcher; Han, Kyusuk; Yeun, Chan Yeob; Park, Jonghyuk; Shon, TaeshikWILEY-BLACKWELLINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04

17

Defending RFID authentication protocols against DoS attacks

Dang Nguyen Duc; Kim, Kwang-JoresearcherELSEVIER SCIENCE BVCOMPUTER COMMUNICATIONS, v.34, no.3, pp.384 - 390, 2011-03

18

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment

Shon, Tae-Shik; Kim, Jang-Seong; Kim, Kwang-JoresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.3, pp.686 - 689, 2011-03

19

Diffusion-Confusion Based Light-Weight Security for Item-RFID Tag-Reader Communication

Dwijaksara, Made Harta; Kim, Kwangjoresearcher; Konidala, Divyan Munirathnam; Kim, DaeyoungresearcherNATIONAL DONG HWA UNIVJOURNAL OF INTERNET TECHNOLOGY, v.12, no.4, pp.669 - 677, 2010-12

20

Reconsidering Ryu-Takagi RFID Authentication Protocol

Duc, Dang Nguyen; Yeun, Chan Yeob; Kim, Kwang-JoresearcherRESEARCH INDIA PUBLICATIONSInternational Journal of Intelligent Computing Research (IJICR), v.1, no.4, 2011

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0