Publications
International Refereed Conference
2020
2019
- Harry Chandra Tanuwidjaja, Rakyong Choi, and Kwangjo Kim (speaker), “A Survey on Deep Learning Techniques for Privacy-Preserving“, Privacy-Preserving Machine Learning Workshop 2019, Aug.18. 2019, UCSB, USA (19/10/11)
- Harry Chandra Tanuwidjaja, Rakyong Choi, and Kwangjo Kim “A Survey on Deep Learning Techniques for Privacy-Preserving“, The Second International Conference on Machine Learning for Cyber Security (ML4CS 2019), Sep. 20-22, 2019, Xidian, China (19/10/14)
2018
- Rakyong Choi and Kwangjo Kim, “A Novel Non-Interactive Multi-party Key Exchange from Homomorphic Encryption“, Proc. of Provable Security Workshop 2018, Oct., 25-28, 2018, Jeju, Korea. (18/12/28)
- Hyeongcheol An, Rakyong Choi, and Kwangjo Kim, “Blockchain-based Decentralized Key Management System with Quantum Resistance“, Post-Proc. of WISA2018, Aug., 23-25, 2018, Jeju, Korea. (18/09/03)
2017
- Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja, Paul D. Yoo, and Kwangjo Kim “Wi-Fi Intrusion Detection Using Weighted-Feature Selection for Neural Networks Classifier“, International Workshop on Big Data and Information Security 2017 IWBIS 2017, Sep., 23-24, 2017, Jakarta, Indonesia. [Best Student Paper Award] (17/11/21)
- Kwangjo Kim and Muhamad Erza Aminanto “Deep Learning in Intrusion Detection Perspective: Overview and Further Challenges“, Keynote Speech at International Workshop on Big Data and Information Security 2017 IWBIS 2017, Sep., 23-24, 2017, Jakarta, Indonesia. (17/11/21)
- Muhamad Erza Aminanto and Kwangjo Kim, “Improving Detection of Wi-Fi Impersonation “, Post-Proc. of WISA2017, Aug., 24-26, 2017, Jeju, Korea. (To appear in LNCS by Springer) (17/09/06)
2016
- Muhamad Erza Aminanto and Kwangjo Kim, “Deep Learning in Intrusion Detection System: An Overview“, 2016 International Research Conference on Engineering and Technology 2016. Jun., 28-30, 2016, Bali, Indonesia. (17/01/20)
- Muhamad Erza Aminanto and Kwangjo Kim, “Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach”, International Workshop on Information Security Applications (WISA 2016). Lecture Notes in Computer Science, vol 10144. Springer, Cham., Aug., 25-27, 2016, Jeju, Korea. (17/01/20)
- Jaemin Park, Sungjin Park, Jisoo Oh, and Jong-Jin Won, “WiFi Networks Using Deep Learning Approach“, 12th IEEE World Congress on Services, 2016. Jun. 27 – Jul. 2, 2016, San Francisco, USA. (17/01/19)
- Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, and Kwangjo Kim, “Revocable Decentralized Multi-Authority Functional Encryption“, Progress in Cryptology – INDOCRYPT 2016, 17th International Conference on Cryptology in India, pp.248-265, Dec., 11-14, 2016, Kolkata, India.(17/01/19)
- Jisoo Oh, Jaemin Park, Sungjin Park, and Jong-Jin Won, “TAaaS: Trustworthy Authentication as a Service“, 9th IEEE International Conference on Cloud Computing, 2016. Jun. 27 – Jul. 2, 2016, San Francisco, USA. (17/01/19)
- Jong Myoung Kim, Zae Myung Kim, and Kwangjo Kim, “An Approach to Spam Comment Detection through Domain-independent Features” Big Data and Smart Computing (BigComp), 2016 International Conference on. IEEE, 2016. Jan. 18-20, 2016, Hong Kong, China (16/01/18)
- Hyo Jin Do, Young-Seob Jeong, Ho-Jin Choi and Kwangjo Kim, “Another Dummy Generation Technique in Location-Based Services” Big Data and Smart Computing (BigComp), 2016 International Conference on. IEEE, 2016. Jan. 18-20, 2016, Hong Kong, China (16/01/18)
2015
- Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyaman, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, “Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack“, Proc. of SECRYPT2015, pp.39-52, Jul., 20-22, 2015, Colmar, Alsace, France. (17/01/20)
2014
- O. Y. Al-Jarrah, P. D. Yoo, and K. Kim, “Large-Scale Network Intrusion Detection“, UAE Forum on Information and Communication Technology Research (ICTRF), May, 11–13, 2014, Abu Dhabi, UAE. (17/01/20)
- O. Y. Al-Jarrah, A. Siddiqui, M. Elsalamouny, P. D. Yoo, S. Muhaidat, and K. Kim, “Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection“, The 1st Big Data Analytics for Security Workshop (DASec), Jun., 30, 2014, Madrid, Spain. Citation=Scopus 7 / Google Scholar 18 (18/11/13)
2013
- H.Takahashi, K. Yasunaga, M. Mambo, K. Kim, and H.Y. Youm, “Preventing Abuse of Cookies Stolen by XSS“, Proc. of AsiaJCIS, Jul., 25-26, Seoul, Korea.(17/01/20)
2012
- Kwangjo Kim, “Challenges of Cyber Security for Nuclear Power Plants“, the 18th Pacific Basin Nuclear Conference (PBNC2012), May, 18-23, 2012, BEXCO, Busan, Korea. (17/01/20)
2011
- Zeen Kim, Junhyun Yim, Jangseong Kim, Kwangjo Kim, and Taeshik Shon, “Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks“, IEEE ISPA2011, May, 26-28, 2011, Busan, Korea. Citation=google scholar: 1 (17/01/20)
- Zeen Kim, Jangseong Kim, Kwangjo Kim, Imsung Choi, and Taeshik Shon, “Untraceable and Serverless RFID Authentication and Search Protocols“, IEEE ISPA2011, May, 26-28, 2011, Busan, Korea. Citation=google scholar: 15 (17/01/20)
- Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim, “Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks“, IEEE INFOCOM2011, Apr., 10-15, 2011, Shanghai, P.R. China. Citation=Google Scholar: 122 (17/01/20)
2010
- Jangseong Kim, Joonsang Baek, Kwangjo Kim, and Jianying Zhou, “Proc. of EuroPKI 2010“, Proc. of EuroPKI 2010, Sep., 23-24, 2010, Athens, Greece. (To Appear in LNCS) Citation=Google scholar: 6 (17/01/20)
- Kyusuk Han, Jangseong Kim, Kwangjo Kim, and Taeshik Shon, “Efficient Sensor Node Authentication via 3GPP Mobile Communication Networks“, 17th ACM Conference on Computer and Communications Security (Poster Session), pp.687-689, Oct., 4-8, 2010, Hyatt Regency Chicago, Chicago, IL, USA. Citation=Google Scholar=6 (17/01/20)
- Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, and Kwangjo Kim, “Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy“, FC2010, LNCS 6052, pp. 304-311, Jan., 25-28, 2010, Tenerife, Canary Isleands, Spain. Citation=Google scholar: 7 (17/01/20)
2009
- Kyusuk Han, Hyeran Mun, Chan Yeob Yeun, and Kwangjo Kim, “Design of Intrusion Detection System Preventing Insider Attack“, The 10th International Workshop on Information Security Applications (WISA 2009), Aug. 24-26, 2009, Busan, Korea. Citation=Google scholar: 0 (12/02/06)
- Junhyun Yim, Imsung Choi, and Kwangjo Kim, “An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks“,The 10th International Workshop on Information Security Applications (WISA 2009), Aug. 24-26, 2009, Busan, Korea. Citation=Google scholar: 2 (12/02/06)
- Hyewon Park, Zeen Kim, and Kwangjo Kim, “Forward Secure ID-based Group Key Agreement Protocol with Anonymity“, The Third International Conference on Sensor Technologies and Applications (SENSORCOMM 2009), June 18-23, 2009, Athens/Glyfada, Greece. –Best Paper Award Citation=Google scholar: 3 (12/02/06)
- Hyeran Mun, Kyusuk Han, and Kwangjo Kim, “3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement based on EAP-AKA“, 2009 IEEE Wireless Telecommunications Symposium WTS 2009), Apr. 22-25, 2009, Prague, Czech Republic. –Best Paper Award Citation=Google scholar: 9 (12/02/06)
- Kyusuk Han, Chanyeob Yoon, and Kwangjo Kim, “New Key Escrow Model for the Lawful Interception in 3GPP“, 2009 IEEE International Conference on Consumer Electronics (ICCE2009), Jan. 12-14, 2009, Las Vegas, USA. Citation=Google scholar: 0 (12/02/06)
- Byoungcheon Lee, Jin Li, and Kwangjo Kim, “Identity-Based Secret Signature Scheme“, ICCIT, pp.1080-1085, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009. Citation=NA (09/10/26)
2008
- Jangseong Kim and Kwangjo Kim, “A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment“, WISA 2008, Sep. 23-25, 2008, Jeju, Korea. Citation=Google scholar: 0 (12/02/06)
- Chunhui Wu, Yuqing Xing, Xiaofeng Chen, Dongyang Long, Hyunrok Lee, and Kwangjo Kim, “Generic On-line/Off-line Aggregate Signatures“, The 5th Int’l Conference on Embedded Software and Systems (ICESS 2008), July 29-31, 2008, Chengdu, China. Citation=Google scholar: 0 (12/02/06)
- Guomin Chen, Chunhui Wu, Wei Han, Xiaofeng Chen, Hyunrok Lee, and Kwangjo Kim, “A New Receipt-Free Voting Scheme Based on Linkable Ring Signature for Designated Verifiers“, The 5th Int’l Conference on Embedded Software and Systems (ICESS 2008), July 29-31, 2008, Chengdu, China. Citation=Google scholar: 3 (12/02/06)
- Jin Li, Kwangjo Kim, Fangguo Zhang, and Duncan S. Wong, “Generic Security-Amplifying Methods of Ordinary Digital Signatures“, ACNS 2008, LNCS 5037, pp.224-241, 2008. Citation=Google scholar: 2 (12/02/06)
2007
- Jangseong Kim, Zeen Kim, and Kwangjo Kim, “A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment“, The 10th International Conference on Information Security and Cryptology, LNCS 4817, pp.37-48 , Nov. 29-30, 2007, Seoul,Korea. Citation=Google scholar: 7 (12/02/06)
- Sungchul Heo, Zeen Kim, and Kwangjo Kim, “Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups“, The 50th IEEE Global Telecommunications Conference, Nov. 26-30, 2007, Washington, D.C., USA. Citation=Google scholar: 7 (12/02/06)
- Jin Li, Tsz Hon Yuen, and Kwangjo Kim, “Practical Threshold Signatures without Random Oracles“, International Conference on Provable Security 2007, Oct. 31 – Nov. 2, 2007, Wollongong, Australia. Citation=Google scholar: 8 (12/02/06)
- Jin Li, Kwangjo Kim, Fangguo Zhang, and Xiaofeng Chen, “Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature“, International Conference on Provable Security 2007, Oct. 31 – Nov. 2, 2007, Wollongong, Australia. Citation=Google scholar: 9 (12/02/06)
- Duc-Liem Vo and Kwangjo Kim, “Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC“, NSS 2007-IFIP International Workshop on Network and System Security, pp.144-147, Sep. 18-19, 2007, Dalian, China. Citation=Google scholar: 2 (12/02/06)
- Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, “New Receipt-free Voting Scheme Using Double-trapdoor Commitment“, The 8th International Workshop on Information Security Applications, pp.395-409, Aug. 27-29, 2007, Jeju, Korea. Citation=Google scholar: 0 (12/02/06)
- Divyan M. Konidala, Zeen Kim and Kwangjo Kim, “A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme“, Pre-Proc. of International Conference on RFID Security 2007 (RFIDSec 07), pp.141-152, July 11-13, 2007, Malaga, Spain. Citation=Google scholar: 40 (12/02/06)
2006
- Dang Nguyen Duc and Kwangjo Kim, “Human Authentication Protocol for Distributed Computing Environment“, Proc. of WISA 2006, pp.367-372, Aug. 28-30, 2006, Jeju Island, Korea. Citation=Google scholar: 0 (12/06/12/)
2005
- Divyan M. Konidala, Dang N. Duc, and Kwangjo Kim, “A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments“, Proc. of IEEE PerSec2005, pp.136-140, Mar. 8-12, 2005, Hawaii, USA. Citation=Google scholar: 8 (12/02/06)
- Dang N. Duc, Kyusuk Han, Zeen Kim, and Kwangjo Kim, “A New Transitive Signature Scheme based on RSA-based Security Assumptionss“, Proc. of Industrial and Short-Papers Track in ACNS2005, pp.165-175, June 7-10, 2005, NY, USA. Citation=Google scholar: 0 (12/02/06)
- Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim, “Mutual Authentication Protocol for Low-cost RFID“, Proc. of Workshop on RFID and Lightweight Crypto, pp.17-24, July 14-15, 2005, Graz, Austria. Citation=Google scholar: 112 (12/02/06)
- Dang N. Duc, Kyusuk Han, Zeen Kim, and Kwangjo Kim, “A New Transitive Signature Scheme based on RSA-based Security Assumptionss“, Proc. of Industrial and Short-Papers Track in ACNS2005, pp.165-175, June 7-10, 2005, NY, USA. Citation=Google scholar: 0 (12/02/06)
- Kui Ren, Jaemin Park, and Kwangjo Kim, “On the Construction of Cryptographically Strong Boolean Functions with Desirable Trade-off“, Journal of Zhejiang University (Science), Vol.6A(5), pp.358-364, May, 2005. Citation=NA (09/10/26)
2004
- Divyan M. Konidala, Chan Yeob Yeun, and Kwangjo Kim, “A Secure and Privacy Enhanced Protocol for Location-based Services in Ubiquitous Society“, Proc. of GLOBECOM2004, Nov. 29 – Dec. 3, 2004, Dallas, Texas, USA. Citation=Google scholar: 6 (12/02/06)
- Kui Ren, Hyunrok Lee, Kyusuk Han, Jaemin Park, and Kwangjo Kim, “An Enhanced Lightweight Authentication Protocol for Access Control in Wireless LANs“, Proc. of ICON2004, IEEE, Nov. 16-19, 2004, Hilton, Singapore. Citation=Google scholar: 3 (12/02/06)
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, and Seungjae Yoo, “Secure Key Issuing in ID-based Cryptography“, Proc. of AISW04, Jan. 18-22, 2004 University of Otago, Dunedin, New Zealand. Citation=Google scholar: 85 (12/02/06)
2003
- SuGil Choi and Kwangjo Kim, “Authentication and Payment Protocol Preserving Location Privacy in Mobile IP“, Proc. of GLOBECOM2003, Dec. 1-5, 2003, San Francisco, USA. Citation=Google scholar: 11 (12/02/06)
2002
- Won Goo Lee, Hee Gyu Lee, Jae Kwang Lee, and Kwangjo Kim, “Design of micro-kernel based security server framework with RBAC policy server“, Proc. of WISA2002, pp.131-146, Aug. 28-30, 2002, Jeju Shilla Hotel. Citation=Google scholar: 0 (12/02/06)
- Wooseok Ham, Hyungki Choi, Yan Xie, Misung Lee, and Kwangjo Kim “Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices” Proc. of WISA2002, pp. 287-301, Aug. 28-30, 2002, Jeju Shilla Hotel. Citation=Google scholar: 12 (12/02/06)
- Byoungcheon Lee and Kwangjo Kim, “Multi-Certification Signatures and Their Applications to Public Key Infrastructure“, Proc. of IWAP2002, pp.3-9, Oct. 30 – Nov. 1, 2002, Taipei, Taiwan. Citation=Google scholar: 0 (12/02/06)
2001
- Jaeseung Go, Jaegwan Park, and Kwangjo Kim, “Wireless Authentication Protocol Preserving User Anonymity“, Proc. of 4th International Symposium on Wireless Personal Multimedia Communications (WPMC’01), pp.1153-1158, Sep. 9-12, 2001, Aalborg Kongres & Kultur Center, Denmark. Citation=Google scholar: 53 (12/02/06)
- Kwangjo Kim, Jinho Kim, Byoungcheon Lee, and Gookwhan Ahn, “Experimental Design of Worldwide Internet Voting System using PKI“, Proc. of SSGRR2001, Aug. 6-10, 2001, L’Aquila, Italy. Citation=Google scholar: 22 (12/02/06)
- Gookwhan Ahn and Kwangjo Kim, “Design and Implementation of Secure Tapping Alert Protocol“, Proc. of WISA2001, pp.103-121, Sep. 13-14, 2001, Interncontinental Hotel, Seoul, Korea. Citation=Google scholar: 0 (12/02/06)
- Byoungcheon Lee, Kwangjo Kim, Moonseog Seo, and Weonkeun Huh “Efficient Offline Path Validation“, Proc. of IWAP2001, pp.117-125, Oct. 19-20, 2001, ICU, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
2000
- Gookwhan Ahn, Kwangjo Kim, and Hee Yong Youn,”Tapping Alert Protocol“, Proc. of WET-ICE2000 Workshop on Enabling Technologies, NIST, USA, IEEE Computer Society, June, 2000. Citation=Google scholar: 3 (12/02/06)
- Heesun Kim, Joonsang Baek, Gookwhan Ahn, Jinho Kim, Hyuncheol Park, Boyeon Song, Manho Lee, Jaegwan Park, Jaeseung Go, Byoungcheon Lee, and Kwangjo Kim, “Design and Implementation of Revocable Electronic Cash System based on Elliptic Curve Discrete Logarithm Problem“, Proc. of WISA2000, pp.85-102, Nov. 23-24, 2000, Grand Intercontinental Hotel, Seoul, Korea. Citation=Google scholar: 17 (12/02/06)
- Kwangjo Kim and Sangjoon Park, and Joonsang Baek “Improving Fairness and Privacy of Zhou-Gollman’s Fair Non-repudiation Protocol“, Proc. of 1999 ICPP Workshops on Security(IWSEC), IEEE Computer Society, pp.140-145, Sep. 21-22, 1999, Aizu, Japan. Citation=Google scholar: 52 (12/02/06)
- Kwangjo Kim, Sangjin Lee, Sangjun Park, and Daiki Lee, “DES can be Immune to Linear Cryptanalysis”, Workshop Record of SAC’94 (Selected Areas in Cryptology), pp.70-81, May 5-6, 1994, Queen’s Univ, Canada. Citation=Google scholar: 9 (12/02/06)
- Sangjin Lee, Seung-Cheol Goh, Kwangjo Kim, and Daiki Lee, “BRM Sequence Generators based on the field GF(2^n) for DSP Implementations”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.48, Sep. 17-22, 1995, Whistler, Canada. Citation=NA (09/10/26)
- Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, “An Attack on Tanaka’s Non Interactive Key Sharing Scheme”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.356, Sep. 17-22, 1995, Whistler, Canada. Citation=NA (09/10/26)
- Kwangjo Kim, Sangjin Lee, Sangjoon Park, and Daiki Lee, “Securing DES S-boxes against Three Robust Cryptanalysis”, Workshop Record of SAC’95 (Selected Areas in Cryptology), pp.145-157, May 18-19, 1995, Carleton Univ, Canada. Citation=NA (09/10/26)
- Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, “Integer Addition over GF(2) and its Cryptographic Properties”, Proc. of Third International Conference on Finite Fields and Applications, pp.7, June 11-14, 1995, Univ. of Glasgow, Scotland. Citation=NA (09/10/26)