International Refereed Conference




  • Muhamad Erza Aminanto and Kwangjo Kim, “Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach”, Post-Proc. of WISA2016, Aug., 25-27, 2016, Jeju, Korea. (To appear in LNCS by Springer) (17/01/20)



  • O. Y. Al-Jarrah, P. D. Yoo, and K. Kim, “Large-Scale Network Intrusion Detection“, UAE Forum on Information and Communication Technology Research (ICTRF), May, 11–13, 2014, Abu Dhabi, UAE. (17/01/20)





  • Jangseong Kim, Joonsang Baek, Kwangjo Kim, and Jianying Zhou, “Proc. of EuroPKI 2010“, Proc. of EuroPKI 2010, Sep., 23-24, 2010, Athens, Greece. (To Appear in LNCS) Citation=Google scholar: 6 (17/01/20)


  • Byoungcheon Lee, Jin Li, and Kwangjo Kim, “Identity-Based Secret Signature Scheme“, ICCIT, pp.1080-1085, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009. Citation=NA (09/10/26)


  • Chunhui Wu, Yuqing Xing, Xiaofeng Chen, Dongyang Long, Hyunrok Lee, and Kwangjo Kim, “Generic On-line/Off-line Aggregate Signatures“, The 5th Int’l Conference on Embedded Software and Systems (ICESS 2008), July 29-31, 2008, Chengdu, China. Citation=Google scholar: 0 (12/02/06)


  • Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, “New Receipt-free Voting Scheme Using Double-trapdoor Commitment“, The 8th International Workshop on Information Security Applications, pp.395-409, Aug. 27-29, 2007, Jeju, Korea. Citation=Google scholar: 0 (12/02/06)



  • Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim, “Mutual Authentication Protocol for Low-cost RFID“, Proc. of Workshop on RFID and Lightweight Crypto, pp.17-24, July 14-15, 2005, Graz, Austria. Citation=Google scholar: 112 (12/02/06)





  • Byoungcheon Lee, Kwangjo Kim, Moonseog Seo, and Weonkeun Huh “Efficient Offline Path Validation“, Proc. of IWAP2001, pp.117-125, Oct. 19-20, 2001, ICU, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)


  • Gookwhan Ahn, Kwangjo Kim, and Hee Yong Youn,”Tapping Alert Protocol“, Proc. of WET-ICE2000 Workshop on Enabling Technologies, NIST, USA, IEEE Computer Society, June, 2000. Citation=Google scholar: 3 (12/02/06)
  • Kwangjo Kim, Sangjin Lee, Sangjun Park, and Daiki Lee, “DES can be Immune to Linear Cryptanalysis”, Workshop Record of SAC’94 (Selected Areas in Cryptology), pp.70-81, May 5-6, 1994, Queen’s Univ, Canada. Citation=Google scholar: 9 (12/02/06)
  • Sangjin Lee, Seung-Cheol Goh, Kwangjo Kim, and Daiki Lee, “BRM Sequence Generators based on the field GF(2^n) for DSP Implementations”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.48, Sep. 17-22, 1995, Whistler, Canada. Citation=NA (09/10/26)
  • Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, “An Attack on Tanaka’s Non Interactive Key Sharing Scheme”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.356, Sep. 17-22, 1995, Whistler, Canada. Citation=NA (09/10/26)
  • Kwangjo Kim, Sangjin Lee, Sangjoon Park, and Daiki Lee, “Securing DES S-boxes against Three Robust Cryptanalysis”, Workshop Record of SAC’95 (Selected Areas in Cryptology), pp.145-157, May 18-19, 1995, Carleton Univ, Canada. Citation=NA (09/10/26)
  • Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, “Integer Addition over GF(2) and its Cryptographic Properties”, Proc. of Third International Conference on Finite Fields and Applications, pp.7, June 11-14, 1995, Univ. of Glasgow, Scotland. Citation=NA (09/10/26)