Researcher Page

사진
Kim, Kwangjo (김광조)
교수, School of Computing(전산학부)
Research Area
Authentication, Network Security, Industrial Security, SCADA security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) Altmetrics
    1
    Article
    Post-quantum security of IGE mode encryption in Telegram

    Lee, Jeeun; Kim, Sungsook; Lee, Seunghyun; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS AND COMPUTER SCIENCES, v.E102-A, no.1, pp.148 - 151, 2019-01

    2
    Article
    eMotion: An SGX extension for migrating enclaves

    Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoonresearcher; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

    3
    Article
    Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    Aminanto, Muhamad Erza; Choi, Rakyong; Tanuwidjaja, Harry Chandra; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.13, no.3, pp.621 - 636, 2018-03

    4
    Article
    암호와 정보보호

    김광조researcher, 학문연구의 동향과 쟁점 - 전기공학, 전자공학, 정보통신공학, v.7, 2018-01

    5
    Article
    Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

    Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12

    6
    Article
    양자 컴퓨터 공격에 안전한 격자 기반키 교환 방식의 비교

    최락용; 안형철; 이지은; et al, 한국통신학회논문지, v.42, no.11, pp.2200 - 2207, 2017-11

    7
    Article
    Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

    Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01

    8
    Article
    Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

    Omar Y. Al-Jarrah; Omar Alhussein; Paul D. Yoo; et al, IEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08

    9
    Article
    Differentially private client-side data deduplication protocol for cloud storage services

    Shin, Youngjoo; Kim, Kwangjoresearcher, SECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

    10
    Article
    Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework

    Huseynov, Khalid; Yoo, Paul D.; 김광조researcher, 정보보호학회논문지, v.25, no.4, pp.807 - 816, 2015-08

    11
    Article
    조직의 실시간 보안관리 체계 확립을 위한 ‘인터페이스 보안’ 강화에 대한 연구

    박준정; 김소라; 안수현; et al, 정보처리학회논문지. 컴퓨터 및 통신시스템, v.4, no.5, pp.171 - 176, 2015-05

    12
    Article
    Identity-based chameleon hashing and signatures without key exposure

    Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; et al, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

    13
    Article
    escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구

    김광조researcher; 이동수, 한국정보보호학회지, v.24, no.2, pp.7 - 20, 2014-04

    14
    Article
    Efficient and Secure File Deduplication in Cloud Storage

    Shin, Youngjoo; Kim, Kwangjoresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

    15
    Article
    A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks

    Kim, Jang-Seong; Kim, Kwang-Joresearcher, TELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1377 - 1388, 2013-02

    16
    Article
    Generic security-amplifying methods of ordinary digital signatures

    Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; et al, INFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10

    17
    Article
    Resuscitating privacy-preserving mobile payment with customer in complete control

    Konidala, Divyan Munirathnam; Dwijaksara, Made Harta; Kim, Kwangjoresearcher; et al, PERSONAL AND UBIQUITOUS COMPUTING, v.16, no.6, pp.643 - 654, 2012-08

    18
    Article
    Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

    Han, Kyusuk; Kim, Kwangjoresearcher; Choi, Wook; et al, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

    19
    Article
    A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment

    Kim, Jang-Seong; Kim, Kwang-Joresearcher; Park, Jong-Hyuk; et al, MATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.45 - 57, 2012-01

    20
    Article
    Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

    Han, Kyusuk; Shon, Taeshik; Kim, Kwangjoresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.8, pp.2235 - 2238, 2011-08

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0