Publications
International Refereed Journal
2022
- Muhamad Erza Aminanto, R. Satrio Hariomurti Wicaksono, Achmad Eriza Aminanto, Harry Chandra Tanuwidjaja, Lin Yola, and Kwangjo Kim, “Multi-Class Intrusion Detection using Two-Channel Color Mapping in IEEE 802.11 Wireless Network”, IEEE Access, Vol. 10, pp. 36791-36801, 2022.
- Muhamad Erza Aminanto, Ibnu Rifqi Purbomukti , Harry Chandra and Kwangjo Kim, “Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet”, Computer, Material & Continua, Vol. 72, No. 3, pp.5301-5314, 2022
2020
- Harry Chandra Tanuwidjaja, Rakyong Choi, Seunggeun Baek, and Kwangjo Kim, “Privacy-Preserving Deep Learning on Machine Learning as a Service – A Comprehensive Survey,” IEEE Access, Vol. 8, pp. 167425-167447, 2020.
- Edwin Ayisi Opare and Kwangjo Kim, “A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures,” IEEE Access, Vol. 8, pp. 110810-110847, 2020.
- Rakyong Choi, Dongyeon Hong, Seongho Han, Seunggeun Baek, Wooseok Kang and Kwangjo Kim, “Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE,” IEEE Access, Vol. 8, pp. 94610-94630, 2020.
- Kwangjo Kim, “Intrusion Detection System Using Deep Learning and its Application to Wi-Fi Network“, IEICE Trans. on Information and Systems, Vol.E103-D, No.7, pp.1433-1447, July 2020.
- Raphaël CW Phan et al., “Advances in Security Research in the Asiacrypt Region“, Commun. ACM, Vol.63, No.4, March 2020.
2019
- Jeeun Lee, Sungsook Kim, Seunghyun Lee, and Kwangjo Kim. “Post-quantum security of IGE mode encryption in Telegram“. IEICE Trans. Fundamentals, E102-A(1):148–151, January 2019.
- Jaemin Park, Sungjin Park, Brent Byunghoon Kang, and Kwangjo Kim, “eMotion: An SGX extension for migrating enclaves“, Elsevier Computers & Security Vol.80, pp.173-185 [SCIE, IF=2.650].
2018
- Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, and Kwangjo Kim, “Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection“, IEEE Trans. on Information Forensics and Security (IF&S) Vol.13, No.3, pp.621-636, [SCI, IF=4.332]. Citation=Scopus 5 / WoS 3 / Google Scholar 12 (18/11/13)
2017
- Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto, “Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack“, IEICE Trans. on Fundamentals, Vol.E100-A No.12 pp.2991-3006, Dec.,2017 [SCI, IF=0.274 (2016)]. Citation=Web of Science:0 Google Scholar: 0 (2017/12/01)
- Muhamad Erza Aminanto, Hakju Kim, Kyung-Min Kim, and Kwangjo Kim, “Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm“, IEICE Trans. on Fundamentals, Vol.E100-A, No.01, pp.176-183, Jan., 2017. [SCIE, IF=0.39]. Citation=Scopus 5 / WoS 3 / Google Scholar 5 (18/11/13)
2016
- Omar Y. Al-Jarrah, Omar Alhussein, Paul D. Yoo, Sami Muhaidat, Kamal Taha, and Kwangjo Kim, “Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection“, IEEE Trans. on Cybernetics, Vol. 46, No. 8, pp. 1796-1806, Aug., 2016. [SCI, IF=3.469]. Citation=Scopus 23 / WoS 12 / Google Scholar 37 (18/11/13)
2014
- Youngjoo Shin and Kwangjo Kim, “Efficient and Secure File Deduplication in Cloud Storage“, IEICE Trans. on Information and Systems, Vol. E97-D, No.2, pp.184-197, Feb., 2014. [SCIE, IF=0.218]. Citation=Web of Science:1 Google Scholar: 4 (17/01/09)
- Youngjoo Shin and Kwangjo Kim, “Differentially Private Client‐side Data Deduplication Protocol for Cloud Storage Services“, Security and Communication Networks, Wiley Online Pub., 2014. [SCIE, IF=0.72]. Citation=Scopus 9 / WoS 5 / Google Scholar 14 (18/11/13)
- Xiaofeng Chen, Fangguo Zhang, Wiley Susilo, Haibo Tian, Jin Li, and Kwangjo Kim, “Identity-based Chameleon Hashing and Signatures without Key Exposure“, Information Sciences, Vol. 265, pp.198-210, May, 2014, [SCI, IF=3.643]. Citation=Scopus 17 / WoS 14 / Google Scholar 27 (18/11/13)
2013
- Jangseong Kim, Kwangjo Kim, “A Scalable and Robust Hierarchical Key Establishment for Mission-critical Applications over Sensor Networks“, Telecommunication Systems, Vol.52, No.2, pp.1377-1388, Feb., 2013. [SCIE, IF=1.027]. Citation=Web of Science:0 Google Scholar: 4 (17/01/09)
- Zeen Kim, Jangseong Kim,Doyoung Chung, Kwangjo Kim, and Taeshik Shon, “A Scalable Privacy-preserving Authentication Protocol for Secure Vehicular Communications“, INFORMATION – An International Interdisciplanary Journal, Oct., 2013. [SCIE, IF=0.358]. Citation=Web of Science:0 Google Scholar: 0 (17/01/09)
2012
- Jangseong Kim, Kwangjo Kim, Jonghyuk Park, and Taeshik Shon, “A Scalable and Privacy-Preserving Child-Care and Safety Service in a Ubiquitous Computing Environment”, Mathematical and Computer Modeling, Vol. 55, No 1-2, pp.45-57, Elsevier, Jan., 2012. [SCIE, IF=1.346] Citation=Web of Science: 4 Google Scholar: 6 (17/01/16)
- Kyusuk Han, Kwangjo Kim, Wook Choi, Hyo Hyun Choi, Jungtaek Seo, and Taeshik Son, “Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks”, Ad Hoc and Sensor Wireless Network, Vol. 14, No.3-4, pp.251-269, Old City Publishing, 2012. [SCIE, IF=0.400]. Citation=Web of Science: 4 Google Scholar: 3 (17/01/16)
- Divyan M. Konidala, Made H. Dwijaksara, Kwangjo Kim, Dongman Lee, Daeyoung Kim, Byoungcheon Lee, and Soontae Kim, “Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control“, Journal of Personal and Ubiquitous Computing (PUC). Vol.16, pp.643-654, Aug., 2012. Springer. [SCIE, IF=0.938]. Citation=Web of Science: 2 Google Scholar: 9 (17/01/09)
- Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, and Duncan S. Wong, “Generic Security-amplifying Methods of Ordinary Signatures“, Information Sciences, Vol. 201, pp.128-139, Oct., 2012. [SCI, IF=2.147]. Citation=Web of Science:2 Google Scholar: 10 (17/01/09)
2011
- Kyusuk Han, Taeshik Son, and Kwangjo Kim, “Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security“, IEICE Trans. on Communications, Vol.E94B, No.8, pp.2235-2238, Aug., 2011. [SCI, IF=0.359]. Citation=Web of Science: 0 Google Scholar: 0 (17/01/18)
- Xiaofeng Chen, Fangguo Zhang, Haibo Tan, Baodian Wei, and Kwangjo Kim, “Discrete logarithm based chameleon hashing and signatures without key exposure“, Computers & Electrical Engineering, Vol.37, No.4, pp.614-623, Elsevier, Jul., 2011. [SCIE, IF=0.284]. Citation=Web of Science: 8 Google Scholar: 14 (17/01/18)
- Kyusuk Han, Kwangjo Kim, and Taeshik Shon, “Enhancing Credibility of Location Based Service using Multiple Sensing Technologies“, IEICE Trans. on Information and Systems, Vol.E94-D, No.6, pp.1181-1184, Jun., 2011. [SCIE, IF=0.287]. Citation=Web of Science: 0 Google Scholar: 0 (17/01/16)
- Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, “New Receipt-free Voting Scheme Using Double-trapdoor Commitment”, Information Sciences, Vol. 181, No. 8, pp.1493-1502, 2011, Elsevier, Apr., 2011. [SCI, IF=2.147]. Citation=Web of Science: 12 Google Scholar: 23 (17/01/16)
- Dang Nguyen Duc and Kwangjo Kim, “Defending RFID Authentication Protocols against DoS Attacks“, Computer Communications, Vol. 34, No. 2, pp.384-390, Mar., 2011. [SCIE, IF=0.884]. Citation=Web of Science: 12 Google Scholar: 23 (17/01/16)
- Jangseong Kim, Taeshik Shon, and Kwangjo Kim, “Location-aware and Privacy-preserving Approach for Child-care and Safety in Ubiquitous Computing Environment”, IEICE Trans. on Communications, Vol. E94-B, No. 3, pp.686-689, Mar., 2011. [SCI, IF=0.359]. Citation=Web of Science: 0 Google Scholar: 0 (17/01/16)
- Divyan M. Konidala, Kwangjo Kim, Made Harta Dwijaksara, and Daeyoung Kim, “Diffusion-Confusion based Light-Weight Security for Item-RFID Tag-Reader Communication“, Journal of Internet Technology (JIT). Accepted on 08/09/2010, 2011. [SCIE, IF=0.2334]. Citation=Web of Science: 0 Google Scholar: 0 (17/01/16)
- Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jonghyuk Park, and Kwangjo Kim, “A Scalable and Efficient Key Escrow Model for Lawful Interceptions of IDBC based Secure Communication“, International Journal of Communication System, Special Issue on Ubiquitous Computing for Communications and Broadcasting, Vol.24, No.4, pp.461-472, John Wiley & Sons, Apr., 2011. [SCIE, IF=0.406]. Citation=Web of Science: 7 Google Scholar: 10 (17/01/16)
2010
- Kyusuk Han, Taeshik Shon, and Kwangjo Kim, “Efficient Mobile Sensor Authentication In Smart Home and WPAN“, IEEE Trans. on Consumer Electronics, Vol.56, Issue 2, pp.591-596, May, 2010. [SCI, IF=0.367].Citation=Web of Science: 5 Google Scholar: 14 (17/01/18)
- Kyusuk Han, Kwangjo Kim, and Taeshik Shon, “Untraceable Mobile Node Authentication in WSN“, Sensors, Vol. 10, No. 5, pp.4410-4429, May, 2010. [SCIE, IF=1.821]. Citation=Web of Science: 5 Google Scholar: 28 (17/01/18)
- Jin Li and Kwangjo Kim, “Hidden attribute-based signatures without anonymity revocation“, Information Sciences, Vol.180, pp.1681-1689, Elsevier, May, 2010. [SCI, IF=2.147], Citation=Web of Science: 57 Google Scholar: 121 (17/01/18)
- Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, and Kwangjo Kim, “Enhancements of Authenticated Multiple Key Exchange Protocol based on Bilinear Pairings“, Computers & Electrical Engineering, Vol.36, pp.155-159, Jan., 2010, Elsevier. [SCIE, IF=0.284], Citation=Web of Science: 8 Google Scholar: 22 (17/01/18)
- Dang Nguyen Duc and Kwangjo Kim, “On the Security of RFID Group Scanning Protocols“, IEICE Trans. on Information and Systems, Vol.E93-D, No.3, pp.528-530, Mar., 2010. [SCIE, IF=0.287], Citation=Web of Science: 0 Google Scholar: 9 (17/01/18)
2009
- Jiquiang Lv, Kui Ren, Xiaofeng Chen, and Kwangjo Kim, “The Ring Authenticated Encryption Scheme–how to provide a clue wisely“, Information Sciences, Vol.179, pp.161-168, Elsevier, Jan., 2009. [SCI, IF=2.147], Citation=Web of Science: 2 Google Scholar: 5 (17/01/18)
2008
- Chanyeob Yoon, Kyusuk Han, Vo Duc Liem, and Kwangjo Kim, “Secure Authenticated Group Key Agreement Protocol in the MANET Environment“, Information Security Technical Report, Vol.13, pp.158-164, 2008, Elsevier. Citation=Web of Science: 0 Google Scholar: 9 (17/01/18)
- Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, and Kwangjo Kim, “Efficient Generic On-line/off-line (Threshold) Signatures Without Key Exposure“, Information Sciences, Vol.178, pp.4192-4203, Nov., 2008, Elsevier. [SCI, IF=2.147], Citation=Web of Science: 23 Google Scholar: 43 (17/01/18)
- Duc-Liem Vo and Kwangjo Kim, “A Secure Mutual Authentication Scheme with Key Agreement using Smart Card from Bilinear Pairings“, Int’l Journal of Computer Systems Science & Engineering, Vol.23, No. 3, pp.139-152, May, 2008. [SCIE, IF=0.277]. Citation=Web of Science: 0 Google Scholar: 0 (17/01/18)
2007
- Duc-Liem Vo and Kwangjo Kim, “Security Analysis of an ID-based Key Agreement for Peer Group Communication“, IEICE Trans. on Fundamentals, Vol.E90-A, pp.2624-2625, Nov., 2007. [SCIE, IF=0.287], Citation=Web of Science: 0 Google Scholar: 3 (17/01/18)
2006
- Divyan M. Konidala and Kwangjo Kim, “Mobile RFID Applications and Security Challenges“, Proc. of ICISC 2006, LNCS 4296, pp.194-205, Nov., 30 – Dec., 1, 2006. Springer-Verlag, Busan, Korea. [SCIE, IF=0.402], Citation=Web of Science: 0 Google Scholar: 8 (17/01/18)
- Youngjoon Seo, Hyunrok Lee, and Kwangjo Kim, “Scalable and Untraceable Authentication Protocol for RFID“, The 2nd International Workshop on Security Ubiquitous Computing Systems, LNCS 4097, pp. 252-261, Aug., 2006, Springer-Verlag, Seoul, Korea. [SCIE, IF=0.402], Citation=Web of Science: 5 Google Scholar: 26 (17/01/18)
- Kui Ren, Wenjing Lou, Robert H. Deng, and Kwangjo Kim, “A Novel Privacy Preserving Authentication and Access Control Scheme in Pervasive Computing Environments“, IEEE Trans. on Vehicular Technology, Vol.55, No.4, pp.1373-1384, Jul., 2006. [SCIE, IF=1.071], Citation=Web of Science: 51 Google Scholar: 155 (17/01/18)
2005
- Fangguo Zhang and Kwangjo Kim, “Cryptanalysis of Lee-Hwang-Li’s Key Authentication Schemes“, Applied Mathematics and Computation. Vol.161, Issue 1, pp.101-107, Feb., 4, 2005, Elsevier. [SCIE, IF=0.688], Citation=Web of Science: 2 Google Scholar: 10 (17/01/18)
- Jiqiang Lv, Xinmei Wang, and Kwangjo Kim, “Security of a Multi Signature Scheme for Specified Group of Verifiers“, Applied Mathematics and Computation, Vol.166, Issue 1, pp.58-63, Jul., 2005, Elsevier. [SCIE, IF=0.688], Citation=Web of Science: 6 Google Scholar: 12 (17/01/18)
- Jiqiang Lv, Xinmei Wang, and Kwangjo Kim, “Practical Convertible Authenticated Encryption Schemes using Self-certified Public Keys“, Applied Mathematics and Computation, Vol.169, Issue 2, pp.1285-1297, Oct., 2005, Elsevier. [SCIE, IF=0.688], Citation=Web of Science: 22 Google Scholar: 42 (17/01/18)
- Duc-Liem Vo and Kwangjo Kim, “Yet Another Forward Secure Signature from Bilinear Pairings“, Proc. of ICISC2005, LNCS 3935, pp.441-455, Dec., 2005, Springer-Verlag, Seoul, Korea. [SCIE, IF=0.402], Citation=Web of Science: 3 Google Scholar: 10 (17/01/18)
2004
- Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, “Limited Verifier Signature Scheme from Bilinear Pairings“, Proc. of ACNS 04, LNCS 3089, pp.135-148, Jun., 2004, Springer-Verlag, Yellow Mountain, China. [SCIE, IF=0.513], Citation=Web of Science: 7 Google Scholar: 18 (17/01/18)
- Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, and So Ran Ine, “Threshold Password-Based Authentication using Bilinear Pairings“, Proc. of European PKI, LNCS 3093, pp.350-363, Jun., 25-26, 2004, Springer-Verlag, Samos island, Greece. [SCIE, IF=0.513], Citation=Web of Science: 3 Google Scholar: 6 (17/01/18)
- SungJun Min, Go Yamamoto, and Kwangjo Kim, “Weak Property of Malleability in NTRUSign“, Proc. of ACISP04, LNCS 3108, pp.379-390, Jul., 13-15, 2004, Springer-Verlag, Sydney, Australia. [SCIE, IF=0.513], Citation=Web of Science: 3 Google Scholar: 14 (17/01/18)
- Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, “Chameleon Hashing without Key Exposure“, Proc. of the 7th International Information Security Conference (ISC’04), LNCS 3225, pp.87-98, 2004, Springer-Verlag. Palo Alto, USA, [SCIE, IF=0.513], Citation=Web of Science: 30 Google Scholar: 67 (17/01/18)
- Kui Ren, Hyunrok Lee, and Kwangjo Kim, “Efficient Authenticated Key Agreement Protocol for Dynamic Groups“, Proc. of WISA2004, LNCS 3325, pp.233-247, Aug., 23-25, 2004, Jeju, Korea. [SCIE, IF=0.513], Citation=Web of Science: 1 Google Scholar: 9 (17/01/18)
- Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, and Kwangjo Kim, “New ID-based Threshold Signature Scheme from Bilinear Pairings“, Proc. of INDOCRYPT2004, LNCS 3348, pp.371-383, Dec., 20-22, 2004, Springer-Verlag, Chennai(Madras), India. [SCIE, IF=0.513], Citation=Web of Science: 20 Google Scholar: 59 (17/01/18)
- Kui Ren,Tieyan Li, Zhiguo Wan, Feng Bao, Robert Deng, and Kwangjo Kim, “Highly Reliable Trust Establishment Scheme in Ad Hoc Networks” Computer Networks, Vol.45, pp.687-699, Aug., 2004, Elsevier. [SCIE, IF=1.226], Citation=Web of Science: 36 Google Scholar: 125 (17/01/18)
2003
- Arvind Narayanan, C.Pandu Rangan, and Kwangjo Kim, “Practical Pay TV Schemes“, Proc. of ACISP’03, LNCS 2727, pp.192-203, Jul., 9-11, 2003, Springer-Verlag, Wollongong, Australia. [SCIE, IF=0.513], Citation=Web of Science: 10 Google Scholar: 25 (17/01/19)
- SuGil Choi, Kwangjo Kim, and Byeonggon Kim, “Practical Solution for Location Privacy in Mobile IPv6“, Proc. of WISA2003, LNCS 2908, pp.69-83, Aug., 25-27, 2003, Springer-Verlag, Jeju, Korea. [SCIE, IF=0.513], Citation=Web of Science: 4 Google Scholar: 18 (17/01/19)
- Xie Yan and Kwangjo Kim, “ID-Based Distributed ‘magic ink’ Signature from Pairings“, Proc. of ICICS2003, LNCS 2836, pp.249-259, Oct., 10-13, 2003, Springer-Verlag, Huhehaote city, Inner-Mongolia, China. [SCIE, IF=0.513], Citation=Web of Science: 1 Google Scholar: 12 (17/01/19)
- Dang Nguyen Duc, Jung Hee Cheon, and Kwangjo Kim, “A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption“, Proc. of ICICS03, LNCS 2836, pp.11-21, Oct., 10-13, 2003, Springer-Verlag, Huhehaote city, Inner-Mongolia, China. [SCIE, IF=0.513], Citation=Web of Science: 4 Google Scholar: 24 (17/01/19)
- Sangwon Lee, Yongdae Kim, Kwangjo Kim, and Dae-Hyun Ryu, “An Efficient Tree-based Group Key Agreement using Bilinear Map“, Proc. of ACNS2003, LNCS 2846, pp.357-371, Oct., 16-19, 2003, Springer-Verlag, Kumming, China. [SCIE, IF=0.513], Citation=Web of Science: 15 Google Scholar: 47 (17/01/19)
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, and Seungjae Yoo, “Providing Receipt-freeness in Mixnet-based Voting Protocols“, Proc. of ICISC03, LNCS 2971, pp.261-274, Nov., 27-28, 2003, Seoul, Korea. [SCIE, IF=0.513], Citation=Web of Science: 6 Google Scholar: 130 (17/01/19)
- Xiaofeng Chen, Byoungcheon Lee, and Kwangjo Kim, “Receipt-free Electronic Auction Schemes Using Homomorphic Encryption“, Proc. of ICISC03, LNCS 2971, pp.275-290, Nov., 27-28, 2003, Seoul, Korea. [SCIE, IF=0.513], Citation=Web of Science: 11 Google Scholar: 38 (17/01/19)
- V.Vinod, Arvind Narayanan, K,Srinathanm, C.Pandu Rangan, and Kwangjo Kim, “On the Power of Computational Secret Sharing“, Proc. of INDOCRYPT 2003, LNCS 2904, Dec., 8-10, 2003, New Delhi, India. [SCIE, IF=0.513], Citation=Web of Science: 8 Google Scholar: 37 (17/01/19)
- Fangguo Zhang and Kwangjo Kim, “A Universal Forgery on Araki et al’s Convertible Limited Verifier Signature Scheme“, IEICE Trans. on Fundamentals, Vol. E86-A, No.2, pp.515-516, Feb., 2003. [SCIE, IF=0.374], Citation=Web of Science: 21 Google Scholar: 36 (17/01/18)
- Fangguo Zhang and Kwangjo Kim, “Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Parings“, Proc. of ACISP’03, LNCS 2727, pp.312-323, Jul., 9-11, 2003, Springer-Verlag,Wollongong, Australia. [SCIE, IF=0.513], Citation=Web of Science: 109 Google Scholar: 317 (17/01/18)
2002
- Myungsun Kim and Kwangjo Kim “A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem“, Proc. of ACISP2002, LNCS 2384, pp.464-481, 2002, Springer Verlag, Melbourne, Australia. [SCIE, IF=0.515], Citation=Web of Science: 6 Google Scholar: 41 (17/01/19)
- Fangguo Zhang, Shengli Liu, and Kwangjo Kim “Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems“, Proc. of ACISP2002, LNCS 2384, pp.203-213, 2002, Springer Verlag, Melbourne, Australia. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 2 (17/01/19)
- Byoungcheon Lee and Kwangjo Kim, “Self-Certified Signature“, Proc. of INDOCRYPT 2002, LNCS 2251, pp.199-214, 2002, Springer Verlag, Hyderabad, India. [SCIE, IF=0.515], Citation=Web of Science: 9 Google Scholar: 48 (17/01/19)
- Fangguo Zhang and Kwangjo Kim “ID-Based Blind Signature and Ring Signature from Pairings“, Proc. of ASIACRYPT 2002, LNCS 2501, pp.533-547, 2002, Springer Verlag, Queenstown, New Zealand. [SCIE, IF=0.515], Citation=Web of Science: 205 Google Scholar: 575 (17/01/19)
- Myungsun Kim, Jongseong Kim, and Kwangjo Kim, “Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption“, Proc. of ICICS 2002, LNCS 2513, pp.97-108, 2002, Springer Verlag, Seoul, Korea [SCIE, IF=0.515], Citation=Web of Science: 2 Google Scholar: 12 (17/01/19)
2001
- Gail-Joon Ahn and Kwangjo Kim, “CONUGA : Constrained User Group Assignment“, Journal of Network and Computer Applications, Vol. 24, No.4, pp.87-100, Apr., 2001.[SCIE, IF=1.000], Citation=Web of Science: 0 Google Scholar: 5 (17/01/19)
- Byoungcheon Lee, Heesun Kim, and Kwangjo Kim “Secure Mobile Agent using Strong Non-designated Proxy Signature“, Proc. of ACISP2001, LNCS 2119, pp.474-486, 2001, Springer Verlag. [SCIE, IF=0.515], Citation=Web of Science: 105 Google Scholar: 270 (17/01/19)
- Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, and SungWoo Kang, “Improved Impossible Differential Cryptanaylsis of Rijndael and Crypton“, Proc. of ICISC2001, LNCS 2288, pp.39-49, Dec., 5-7, 2001, Seoul, Korea. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 132 (17/01/19)
- Jinho Kim, Kwangjo Kim, and Chulsoo Lee, “An Efficient and Provably Secure Threshold Blind Signature“, Proc. of ICISC2001, LNCS Vol.2288, pp.318-327, Dec., 5-7, 2001, Seoul, Korea. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 35 (17/01/19)
- Byoungcheon Lee, Kwangjo Kim, and Joongsoo Ma “Efficient Public Auction with One-Time Registration and Public Verifiability“, Proc. of INDOCRYPT2001, LNCS 2247, pp.162-174, Dec., 16-20, 2001 , Madras, India. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 53 (17/01/19)
2000
- Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, “Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption“, Proc. of ACISP2000, LNCS Vol.1841, pp.49-58, Jul., 2000, Springer-Verlag, Brisbane, Australia. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 26 (17/01/19)
- Joonsang Baek and Kwangjo Kim, “Remarks on the Unknown Key-Share Attacks“, IEICE Trans. on Fundamentals, Vol.E83-A, pp.2766-2769, No.12, Dec., 2000. [SCIE, IF=0.254], Citation=Web of Science: 10 Google Scholar: 27 (17/01/19)
- Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, “Provably Secure Length-saving Public Key Encryption Scheme under the Computational Diffie-Hellman Assumption“, ETRI J., Vol.22, No.4, pp.25-31, Dec., 2000. [SCI, IF=0.936] Citation=Web of Science: 3 Google Scholar: 21 (17/01/19)
- Boyeon Song and Kwangjo Kim, “Two-Pass Authenticated Key Agreement Protocol with Key Confirmation“, Proc. of INDOCRYPT2000, LNCS 1977, pp.237-249, Dec., 10-13, 2000, Calcutta, India. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 46 (17/01/19)
- Byoungcheon Lee and Kwangjo Kim,”Secure MatchMaking Protocols“, Proc. of ICISC 2000, LNCS 2015, pp.123-134, Dec., 8-9, 2000, Springer Verlag, Dongguk Univ. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 5 (17/01/19)
1999
- Moonseog Seo and Kwangjo Kim, “Electronic Funds Transfer Protocol using Domin-verifiable Signcryption Scheme“, Proc. of ICISC’99, LNCS 1787, pp.269-277, Dec., 9-10, 1999, Springer Verlag, Korea Univ., Seoul, Korea. [SCIE, IF=0.515], Citation=Web of Science: 2 Google Scholar: 27 (17/01/19)
1997
- Sungmo Park, Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, “Further Enumerating Correlation Immune Functions”, Information Processing Letter, Vol.61, pp.209-212, 1997. [SCIE, IF=0.252] Citation=Web of Science: 0 Google Scholar: 0 (17/01/19)
- Seongtaek Chee, Sangjin Lee, Kwangjo Kim, and Daeho Kim, “Correlation Immune Functions with Controllable Nonlinearity“, ETRI Journal, Vol.19, No.4, pp.389-401, Dec., 1997. [SCI, IF=0.936] Citation=Web of Science: 3 Google Scholar: 12 (17/01/19)
- Sangjoon Park, Sangwoo Park, Kwangjo Kim, and Dongho Won, “Two Efficient RSA Multisignature Schemes“, Proc. of ICICS’97, LNCS 1334, pp.217-222, Dec., 11-14, 1997. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 18 (17/01/19)
- Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, “Semi-bent Functions”, Proc. of ASIACRYPT’94, LNCS 917, pp.107-118, 1995. Springer-Verlag. [SCIE, IF=0.515], Citation=Web of Science: 7 Google Scholar: 68 (17/01/19)
- Eon-kyong Lee, Kwangjo Kim, and U-Jin Choi, “A Construction of the Simplest Pseudorandom Permutation Generator”, Computers and Mathematics with Applications, Vol.29, No.8, pp. 19-25, 1995.[SCI, IF=0.997], Citation=Web of Science: 0 Google Scholar: 0 (17/01/19)
- Kwangjo Kim, “Construction of DES-like S-boxes based on Boolean Functions Satisfying the SAC”, Proc. of ASIACRYPT’91, LNCS 739, pp.59-72, 1991, Springer-Verlag, Japan. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 42 (17/01/19)
- Kwangjo Kim, Tsutomu Matsumoto, and Hideki Imai, “On Generating Cryptographically Desirable Substitutions“, Trans. of IEICE, Vol.E.73, No.7, pp.1031-1035, Jul., 1990. [SCIE, IF=0.287] Citation=Web of Science: 0 Google Scholar: 9 (17/01/19)
- Kwangjo Kim, Tsutomu Matsumoto, and Hideki Imai, “A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion“, Proc. of CRYPTO’90, LNCS 537, pp.545-553, 1990, Springer-Verlag, UCSB, USA. [SCIE, IF=0.515], Citation=Web of Science: 2 Google Scholar: 32 (17/01/19)