Contents
Publication
2012
2011
- Zeen Kim, Junhyun Yim, Jangseong Kim, Kwangjo Kim, and Taeshik Shon, "Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks", IEEE ISPA2011, May. 26-28, 2011, Busan, Korea. Citation=google scholar: 0(12/02/06)
- Zeen Kim, Jangseong Kim, Kwangjo Kim, Imsung Choi and Taeshik Shon, "Untraceable and Serverless RFID Authentication and Search Protocols", IEEE ISPA2011, May. 26-28, 2011, Busan, Korea. Citation=google scholar: 1(12/02/06)
- Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim, "Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks", IEEE INFOCOM2011, Apr. 10-15, 2011, Shanghai, P.R. China. Citation=Google Scholar: 4 (12/02/06)
2010
- Jangseong Kim, Joonsang Baek, Kwangjo Kim, and Jianying Zhou, "A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments", Proc. of EuroPKI 2010, Sep. 23-24, 2010, Athens, Greece.(To Appear in LNCS) Citation=Google scholar: 1 (12/02/06)
- Kyusuk Han, Jangseong Kim, Kwangjo Kim, and Taeshik Shon, "Efficient Sensor Node Authentication via 3GPP Mobile Communication Networks", 17th ACM Conference on Computer and Communications Security (Poster Session), pp.687-689, Oct. 4-8, 2010, Hyatt Regency Chicago, Chicago, IL, USA. Citation=Google Scholar=2 (12/02/06)
- Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, and Kwangjo Kim, "Identity-Based Chameleon Hash Scheme Without Key Exposure", ACISP 2010, LNCS 6168, pp. 200-215, July 5-7, 2010, Sydney, Australia. Citation=Google scholar: 5 (12/02/06)
- Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, and Kwangjo Kim "Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy", FC2010, LNCS 6052, pp. 304-311, Jan. 25-28, 2010, Tenerife, Canary Isleands, Spain. Citation=Google scholar: 0 (12/02/06)
2009
- Kyusuk Han, Hyeran Mun, Chan Yeob Yeun, and Kwangjo Kim, "Design of Intrusion Detection System Preventing Insider Attack", The 10th International Workshop on Information Security Applications (WISA 2009), Aug. 24-26, 2009, Busan, Korea. Citation=Google scholar: 0 (12/02/06)
- Junhyun Yim, Imsung Choi, and Kwangjo Kim, "An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks",The 10th International Workshop on Information Security Applications (WISA 2009), Aug. 24-26, 2009, Busan, Korea. Citation=Google scholar: 2 (12/02/06)
- Hyewon Park, Zeen Kim, and Kwangjo Kim, "Forward Secure ID-based Group Key Agreement Protocol with Anonymity", The Third International Conference on Sensor Technologies and Applications (SENSORCOMM 2009), June 18-23, 2009, Athens/Glyfada, Greece. -Best Paper Award Citation=Google scholar: 3 (12/02/06)
- Hyeran Mun, Kyusuk Han, and Kwangjo Kim, "3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement based on EAP-AKA", 2009 IEEE Wireless Telecommunications Symposium WTS 2009), Apr. 22-25, 2009, Prague, Czech Republic. -Best Paper Award Citation=Google scholar: 9 (12/02/06)
- Kyusuk Han, Chanyeob Yoon, and Kwangjo Kim, "New Key Escrow Model for the Lawful Interception in 3GPP", 2009 IEEE International Conference on Consumer Electronics (ICCE2009), Jan. 12-14, 2009, Las Vegas, USA. Citation=Google scholar: 0 (12/02/06)
- Byoungcheon Lee, Jin Li, and Kwangjo Kim, "Identity-Based Secret Signature Scheme",
ICCIT, pp.1080-1085, 2009 Fourth International Conference on Computer
Sciences and Convergence Information Technology, 2009.
Citation=NA(09/10/26)
2008
- Jangseong Kim and Kwangjo Kim, "A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment", WISA 2008, Sep. 23-25, 2008, Jeju, Korea. Citation=Google scholar: 0 (12/02/06)
- Chunhui Wu, Yuqing Xing, Xiaofeng Chen, Dongyang Long, Hyunrok Lee, and Kwangjo Kim, "Generic On-line/Off-line Aggregate Signatures", The 5th Int'l Conference on Embedded Software and Systems (ICESS 2008), July 29-31, 2008, Chengdu, China. Citation=Google scholar: 0 (12/02/06)
- Guomin Chen, Chunhui Wu, Wei Han, Xiaofeng Chen, Hyunrok Lee, and Kwangjo Kim, "A New Receipt-Free Voting Scheme Based on Linkable Ring Signature for Designated Verifiers", The 5th Int'l Conference on Embedded Software and Systems (ICESS 2008), July 29-31, 2008, Chengdu, China. Citation=Google scholar: 3 (12/02/06)
- Jin Li, Kwangjo Kim, Fangguo Zhang, and Duncan S. Wong, "Generic Security-Amplifying Methods of Ordinary Digital Signatures", ACNS 2008, LNCS 5037, pp.224-241, 2008. Citation=Google scholar: 2 (12/02/06)
2007
- Jangseong Kim, Zeen Kim, and Kwangjo Kim, "A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment",
The 10th International Conference on Information Security and
Cryptology, LNCS 4817, pp.37-48 , Nov. 29-30, 2007, Seoul,Korea.
Citation=Google scholar: 7 (12/02/06)
- Sungchul Heo, Zeen Kim, and Kwangjo Kim, "Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups", The 50th IEEE Global Telecommunications Conference, Nov. 26-30, 2007, Washington, D.C., USA. Citation=Google scholar: 7 (12/02/06)
- Jin Li, Tsz Hon Yuen, and Kwangjo Kim, "Practical Threshold Signatures without Random Oracles",
International Conference on Provable Security 2007, Oct. 31 - Nov. 2,
2007, Wollongong, Australia. Citation=Google scholar: 8 (12/02/06)
- Jin Li, Kwangjo Kim, Fangguo Zhang, and Xiaofeng Chen, "Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature",
International Conference on Provable Security 2007, Oct. 31 - Nov. 2,
2007, Wollongong, Australia. Citation=Google scholar: 9 (12/02/06)
- Duc-Liem Vo and Kwangjo Kim, "Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC",
NSS 2007-IFIP International Workshop on Network and System Security,
pp.144-147, Sep. 18-19, 2007, Dalian, China. Citation=Google scholar: 2
(12/02/06)
- Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, "New Receipt-free Voting Scheme Using Double-trapdoor Commitment",
The 8th International Workshop on Information Security Applications,
pp.395-409, Aug. 27-29, 2007, Jeju, Korea. Citation=Google scholar: 0
(12/02/06)
- Divyan M. Konidala, Zeen Kim and Kwangjo Kim, "A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme", Pre-Proc. of International Conference on RFID Security 2007 (RFIDSec 07), pp.141-152, July 11-13, 2007, Malaga, Spain. Citation=Google scholar: 40 (12/02/06)
2006
2005
- Divyan M. Konidala, Dang N. Duc, and Kwangjo Kim, "A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments", Proc. of IEEE PerSec2005, pp.136-140, Mar. 8-12, 2005, Hawaii, USA. Citation=Google scholar: 8 (12/02/06)
- Kui Ren, Jaemin Park, and Kwangjo Kim, "On the Construction of Cryptographically Strong Boolean Functions with Desirable Trade-off", Journal of Zhejiang University (Science), Vol.6A(5), pp.358-364, May, 2005. Citation=NA(09/10/26)
- Dang N. Duc, Kyusuk Han, Zeen Kim, and Kwangjo Kim, "A New Transitive Signature Scheme based on RSA-based Security Assumptionss", Proc. of Industrial and Short-Papers Track in ACNS2005, pp.165-175, June 7-10, 2005, NY, USA. Citation=Google scholar: 0 (12/02/06)
- Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim, "Mutual Authentication Protocol for Low-cost RFID",
Proc. of Workshop on RFID and Lightweight Crypto, pp.17-24, July 14-15,
2005, Graz, Austria. Citation=Google scholar: 112 (12/02/06)
- Jaemin Park, Zeen Kim, and Kwangjo Kim, "State-Based Key Management Scheme for Wireless Sensor Networks", Proc. of WSNS2005, pp.819-825, Nov. 7, 2005, Washington, D.C., USA. Citation=Google scholar: 16 (12/02/06)
2004
- Divyan M. Konidala, Chan Yeob Yeun, and Kwangjo Kim, "A Secure and Privacy Enhanced Protocol for Location-based Services in Ubiquitous Society", Proc. of GLOBECOM2004, Nov. 29 - Dec. 3, 2004, Dallas, Texas, USA. Citation=Google scholar: 6 (12/02/06)
- Kui Ren, Hyunrok Lee, Kyusuk Han, Jaemin Park, and Kwangjo Kim, "An Enhanced Lightweight Authentication Protocol for Access Control in Wireless LANs", Proc. of ICON2004, IEEE, Nov. 16-19, 2004, Hilton, Singapore. Citation=Google scholar: 3 (12/02/06)
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, and Seungjae Yoo, "Secure Key Issuing in ID-based Cryptography", Proc. of AISW04, Jan. 18-22, 2004 University of Otago, Dunedin, New Zealand. Citation=Google scholar: 85 (12/02/06)
2003
2002
- Won Goo Lee, Hee Gyu Lee, Jae Kwang Lee, and Kwangjo Kim, "Design of micro-kernel based security server framework with RBAC policy server", Proc. of WISA2002, pp.131-146, Aug. 28-30, 2002, Jeju Shilla Hotel. Citation=Google scholar: 0 (12/02/06)
- Wooseok Ham, Hyungki Choi, Yan Xie, Misung Lee, and Kwangjo Kim "Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices" Proc. of WISA2002, pp. 287-301, Aug. 28-30, 2002, Jeju Shilla Hotel. Citation=Google scholar: 12 (12/02/06)
- Byoungcheon Lee and Kwangjo Kim, "Multi-Certification Signatures and Their Applications to Public Key Infrastructure", Proc. of IWAP2002, pp.3-9, Oct. 30 - Nov. 1, 2002, Taipei, Taiwan. Citation=Google scholar: 0 (12/02/06)
2001
- Jaeseung Go, Jaegwan Park, and Kwangjo Kim, "Wireless Authentication Protocol Preserving User Anonymity", Proc. of 4th International Symposium on Wireless Personal Multimedia Communications (WPMC'01), pp.1153-1158, Sep. 9-12, 2001, Aalborg Kongres & Kultur Center, Denmark. Citation=Google scholar: 53 (12/02/06)
- Kwangjo Kim, Jinho Kim, Byoungcheon Lee, and Gookwhan Ahn, "Experimental Design of Worldwide Internet Voting System using PKI", Proc. of SSGRR2001, Aug. 6-10, 2001, L'Aquila, Italy. Citation=Google scholar: 22 (12/02/06)
- Gookwhan Ahn and Kwangjo Kim, "Design and Implementation of Secure Tapping Alert Protocol", Proc. of WISA2001, pp.103-121, Sep. 13-14, 2001, Interncontinental Hotel, Seoul, Korea. Citation=Google scholar: 0 (12/02/06)
- Byoungcheon Lee, Kwangjo Kim, Moonseog Seo, and Weonkeun Huh "Efficient Offline Path Validation", Proc. of IWAP2001, pp.117-125, Oct. 19-20, 2001, ICU, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
~2000
- Gookwhan Ahn, Kwangjo Kim, and Hee Yong Youn,"Tapping Alert Protocol", Proc. of WET-ICE2000 Workshop on Enabling Technologies, NIST, USA, IEEE Computer Society, June, 2000. Citation=Google scholar: 3 (12/02/06)
- Heesun
Kim, Joonsang Baek, Gookwhan Ahn, Jinho Kim, Hyuncheol Park, Boyeon
Song, Manho Lee, Jaegwan Park, Jaeseung Go, Byoungcheon Lee, and
Kwangjo Kim, "Design and Implementation of Revocable Electronic Cash System based on Elliptic Curve Discrete Logarithm Problem", Proc. of WISA2000, pp.85-102, Nov. 23-24, 2000, Grand Intercontinental Hotel, Seoul, Korea. Citation=Google scholar: 17 (12/02/06)
- Kwangjo Kim and Sangjoon Park, and Joonsang Baek "Improving Fairness and Privacy of Zhou-Gollman's Fair Non-repudiation Protocol",
Proc. of 1999 ICPP Workshops on Security(IWSEC), IEEE Computer Society,
pp.140-145, Sep. 21-22, 1999, Aizu, Japan. Citation=Google scholar: 52
(12/02/06)
- Sangjin Lee, Seung-Cheol Goh, Kwangjo Kim, and
Daiki Lee, "BRM Sequence Generators based on the field GF(2^n) for DSP
Implementations", Proc. of 1995 IEEE International Symposium on
Information Theory, pp.48, Sep. 17-22, 1995, Whistler, Canada.
Citation=NA(09/10/26)
- Sangjoon Park, Yongdae Kim, Sangjin
Lee, and Kwangjo Kim, "An Attack on Tanaka's Non Interactive Key
Sharing Scheme", Proc. of 1995 IEEE International Symposium on
Information Theory, pp.356, Sep. 17-22, 1995, Whistler, Canada.
Citation=NA(09/10/26)
- Kwangjo Kim, Sangjin Lee, Sangjoon
Park, and Daiki Lee, "Securing DES S-boxes against Three Robust
Cryptanalysis", Workshop Record of SAC'95 (Selected Areas in
Cryptology), pp.145-157, May 18-19, 1995, Carleton Univ, Canada.(Postscript). Citation=NA(09/10/26)
- Seongtaek
Chee, Sangjin Lee, and Kwangjo Kim, "Integer Addition over GF(2) and
its Cryptographic Properties", Proc. of Third International Conference
on Finite Fields and Applications, pp.7, June 11-14, 1995, Univ. of
Glasgow, Scotland. Citation=NA(09/10/26)
- Kwangjo Kim,
Sangjin Lee, Sangjun Park, and Daiki Lee, "DES can be Immune to Linear
Cryptanalysis", Workshop Record of SAC'94 (Selected Areas in
Cryptology), pp.70-81, May 5-6, 1994, Queen's Univ, Canada. (Postscript) Citation=Google scholar: 9 (12/02/06)