Browse "CS-Journal Papers(저널논문)" by Author Kim, Kwangjo

Showing results 1 to 60 of 88

1
A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures

Opare, Edwin Ayisi; Kim, Kwangjo, IEEE ACCESS, v.8, pp.110810 - 110847, 2020-06

2
A CONSTRUCTION OF THE SIMPLEST SUPER PSEUDORANDOM PERMUTATION GENERATOR

Lee, Eon-kyong; Kim, Kwangjo; Choi, UJin, COMPUTERS MATHEMATICS WITH APPLICATIONS, v.29, no.8, pp.19 - 25, 1995-04

3
A new identification scheme based on the bilinear Diffle-Hellman problem

Kim, M; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.362 - 378, 2002-07

4
A novel privacy preserving authentication and access control scheme for pervasive computing environments

Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07

5
A RECURSIVE CONSTRUCTION METHOD OF S-BOXES SATISFYING STRICT AVALANCHE CRITERION

Kim, Kwangjo; Matsumoto, Tsutomu; Imai, Hideki, LECTURE NOTES IN COMPUTER SCIENCE, v.537, pp.564 - 574, 1991-01

6
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Han, Kyusuk; Yeun, Chan Yeob; Shon, Taeshik; Park, Jonghyuk; Kim, Kwangjo, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04

7
A universal forgery on Araki et al.s convertible limited verifier signature scheme

Zhang, Fangguo; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E86A, pp.515 - 516, 2003-02

8
Advances in Security Research in the Asiacrypt Region

Phan, Raphael C. W.; Abe, Masayuki; Batten, Lynn; Cheon, Jung Hee; Dawson, E. D.; Galbraith, Steven; Guo, Jian; et al, COMMUNICATIONS OF THE ACM, v.64, no.4, pp.78 - 81, 2020-03

9
An Efficient and Provably Secure Threshold Blind Signature

Kim, Jinho; Kim, Kwangjo; Lee, Chulsoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2288, pp.318 - 327, 2002

10
An efficient tree-based group key agreement using bilinear map

Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2846, pp.357 - 371, 2003

11
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002

12
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, ICICS, 2002

13
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01

14
Chameleon hashing without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.87 - 98, 2004

15
Compact representation of domain parameters of hyperelliptic curve cryptosystems

Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.203 - 213, 2002-06

16
Construction of DES-like S-boxes based on Boolean Functions Satisfying the SAC

Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE, v.739, no.0, pp.59 - 72, 1991

17
CONUGA: Constrained user-group assignment

Ahn, Gail-Joon; Kim, Kwangjo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.24, no.2, pp.87 - 100, 2001-04

18
Correlation immune functions with controllable nonlinearity

Chee, Seongtaek; Lee Sangjin; Kim, Kwangjo; Kim, Daeho, ETRI JOURNAL, v.19, pp.389 - 401, 1997-12

19
Cryptanalysis of Lee-Hwang-Lis key authentication scheme

Zhang, Fangguo; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.161, pp.101 - 107, 2005-02

20
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

Omar Y. Al-Jarrah; Omar Alhussein; Paul D. Yoo; Sami Muhaidat; Taha, K.; Kim, Kwangjo, IEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08

21
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

Aminanto, Muhamad Erza; Choi, Rakyong; Tanuwidjaja, Harry Chandra; Yoo, Paul D.; Kim, Kwangjo, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.13, no.3, pp.621 - 636, 2018-03

22
Design and implementation of an efficient fair off-line E-cash system based on elliptic curve discrete logarithm problem

Lee, Manho; Ahn, Gookwhan; KIm Jinho; Park, Jaekwan; Lee, Byouncheon; Kim, Kwangjo; Lee, Hyukjae, JOURNAL OF COMMUNICATIONS AND NETWORKS, v.4, no.2, pp.81 - 89, 2002-06

23
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

Han, Kyusuk; Shon, Taeshik; Kim, Kwangjo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.8, pp.2235 - 2238, 2011-08

24
Design of Intrusion Detection System Preventing Insider Attack

Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

25
Differentially private client-side data deduplication protocol for cloud storage services

Shin, Youngjoo; Kim, Kwangjo, SECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

26
Diffusion-Confusion Based Light-Weight Security for Item-RFID Tag-Reader Communication

Konidala, Divyan Munirathnam; Kim, Kwangjo; Dwijaksara, Made Harta; Kim, Daeyoung, JOURNAL OF INTERNET TECHNOLOGY, v.12, no.4, pp.669 - 677, 2011-07

27
Discrete logarithm based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Kim, Kwangjo, COMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623, 2011-07

28
Efficient and Secure File Deduplication in Cloud Storage

Shin, Youngjoo; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

29
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks

Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

30
Efficient authenticated key agreement protocol for dynamic groups

Ren, Kui; Lee, Hyunrok; Kim, Kwangjo; Yoo, T, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159, 2005

31
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Han, Kyusuk; Kim, Kwangjo; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

32
Efficient generic on-line/off-line (threshold) signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; et al, INFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203, 2008-11

33
Efficient ID-based blind signature and proxy signature from bilinear pairings

Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323, 2003

34
Efficient Public Auction with One-Time Registration and Public Verifiability

Byoungcheon Lee; Kim, Kwangjo; Ma, JoongSoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2247, no.0, pp.162 - 174, 2001-12

35
Efficient Public Auction with One-Time Registration and Public Verifiability

Lee, Byoungcheon; Kim, Kwangjo; Ma, Joongsoo, INDOCRYPT, 2001

36
An Efficient Tree-based Group Key Agreement using Bilinear Map

Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, Lecture Notes in Computer Science, Vol.2846, pp.357-371, 2003

37
Electronic funds transfer protocol using domain-verifiable signcryption scheme

Seo, Moonseog; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC99 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1787, pp.269 - 277, 2000-12

38
eMotion: An SGX extension for migrating enclaves

Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; Kim, Kwangjo, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

39
Forward Secure ID-based Group Key Agreement Protocol with Anonymity

Park, Hyewon; Kim, Zeen; Kim, Kwangjo, Third International Conference on Emerging Security Information, Systems and Technologies, pp.274-279, 2009-06-18

40
Generic security-amplifying methods of ordinary digital signatures

Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo; Wong, Duncan S., INFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10

41
Hidden attribute-based signatures without anonymity revocation

Li, J; Kim, Kwangjo, INFORMATION SCIENCES, v.180, no.9, pp.1681 - 1689, 2010-05

42
Highly reliable trust establishment scheme in ad hoc networks

Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08

43
ID-Based Blind Signature and Ring Signature from Pairings

Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002

44
ID-based distributed "magic ink" signature from pairings

Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003

45
ID-based, blind signature and ring signature from pairings

Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002

46
Identity-based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

47
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01

48
Improved Impossible Differential Cryptanaylsis of Rijndael and Crypton

Cheon, Jung Hee; Kim, MunJu; Lee, Jung-Yeun; Kim, Kwangjo; Kang, SungWoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2288, no.0, pp.39 - 49, 2002-12

49
Improving bounds for the number of correlation immune Boolean functions

Park, SM; Lee, S; Sung, SH; Kim, Kwangjo, INFORMATION PROCESSING LETTERS, v.61, no.4, pp.209 - 212, 1997-02

50
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network

Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.7, pp.1433 - 1447, 2020-07

51
Limited verifier signature from bilinear pairings

Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3089, pp.135 - 148, 2004

52
Mobile RFID applications and security challenges

Konidala, D.M.; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.4296 LNCS, no.0, pp.194 - 205, 2006-11

53
Multi-Class Intrusion Detection Using Two-Channel Color Mapping in IEEE 802.11 Wireless Network

Aminanto, Muhamad Erza; Wicaksono, R. Satrio Hariomurti; Aminanto, Achmad Eriza; Tanuwidjaja, Harry Chandra; Yola, Lin; Kim, Kwangjo, IEEE ACCESS, v.10, pp.36791 - 36801, 2022

54
New ID-based threshold signature scheme from bilinear pairings

Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3348, pp.371 - 383, 2004

55
On Generating Cryptographically Desirable Substitutions

Kim, Kwangjo; Tsutomu Matsumoto; Hideki Imai, TRANSACTIONS OF THE IEICE , v.73, no.7, pp.1031 - 1035, 1990-01

56
On the Construction of Cryptographically Strong Boolean Functions with Desirable Trade-off

REN Kui; PARK Jaemin; Kim, Kwangjo, JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, v.6A, no.5, pp.358 - 364, 2005-05

57
On the Security of RFID Group Scanning Protocols

Dang, DN; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.528 - 530, 2010-03

58
Post-quantum security of IGE mode encryption in Telegram

Lee, Jeeun; Kim, Sungsook; Lee, Seunghyun; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS AND COMPUTER SCIENCES, v.E102-A, no.1, pp.148 - 151, 2019-01

59
Practical convertible authenticated encryption schemes using self-certified public keys

Lv, Jiqiang; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.169, pp.1285 - 1297, 2005-10

60
Practical solution for location privacy in mobile IPv6

Choi, S.; Kim, Kwangjo; Kim, B., INFORMATION SECURITY APPLICATIONS, v.2908, pp.69 - 83, 2003

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0