default search action
Kwangjo Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c74]Kwangjo Kim:
Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation. ICISC (2) 2023: 235-260 - 2022
- [j48]Muhamad Erza Aminanto, R. Satrio Hariomurti Wicaksono, Achmad Eriza Aminanto, Harry Chandra Tanuwidjaja, Lin Yola, Kwangjo Kim:
Multi-Class Intrusion Detection Using Two-Channel Color Mapping in IEEE 802.11 Wireless Network. IEEE Access 10: 36791-36801 (2022) - 2021
- [b2]Kwangjo Kim, Harry Chandra Tanuwidjaja:
Privacy-Preserving Deep Learning - A Comprehensive Survey. Springer 2021, ISBN 978-981-16-3763-6, pp. 1-71 - 2020
- [j47]Rakyong Choi, Dongyeon Hong, Seongho Han, Seunggeun Baek, Wooseok Kang, Kwangjo Kim:
Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE. IEEE Access 8: 94610-94630 (2020) - [j46]Edwin Ayisi Opare, Kwangjo Kim:
A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures. IEEE Access 8: 110810-110847 (2020) - [j45]Harry Chandra Tanuwidjaja, Rakyong Choi, Seunggeun Baek, Kwangjo Kim:
Privacy-Preserving Deep Learning on Machine Learning as a Service - a Comprehensive Survey. IEEE Access 8: 167425-167447 (2020) - [j44]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j43]Kwangjo Kim:
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network. IEICE Trans. Inf. Syst. 103-D(7): 1433-1447 (2020) - [i15]Rakyong Choi, Dongyeon Hong, Kwangjo Kim:
Constant-round Dynamic Group Key Exchange from RLWE Assumption. IACR Cryptol. ePrint Arch. 2020: 35 (2020)
2010 – 2019
- 2019
- [j42]Jaemin Park, Sungjin Park, Brent ByungHoon Kang, Kwangjo Kim:
eMotion: An SGX extension for migrating enclaves. Comput. Secur. 80: 173-185 (2019) - [j41]Jeeun Lee, Sungsook Kim, Seunghyun Lee, Kwangjo Kim:
Post-Quantum Security of IGE Mode Encryption in Telegram. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 148-151 (2019) - [c73]Harry Chandra Tanuwidjaja, Rakyong Choi, Kwangjo Kim:
A Survey on Deep Learning Techniques for Privacy-Preserving. ML4CS 2019: 29-46 - 2018
- [b1]Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja:
Network Intrusion Detection using Deep Learning - A Feature Learning Approach. Springer 2018, ISBN 978-981-13-1443-8, pp. 1-70 - [j40]Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim:
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection. IEEE Trans. Inf. Forensics Secur. 13(3): 621-636 (2018) - [c72]Hyeongcheol An, Rakyong Choi, Kwangjo Kim:
Blockchain-Based Decentralized Key Management System with Quantum Resistance. WISA 2018: 229-240 - 2017
- [j39]Kwangjo Kim:
Cryptography: A New Open Access Journal. Cryptogr. 1(1): 1 (2017) - [j38]Muhamad Erza Aminanto, Hakju Kim, Kyung-Min Kim, Kwangjo Kim:
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 176-183 (2017) - [j37]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2991-3006 (2017) - [c71]Kwangjo Kim, Muhamad Erza Aminanto:
Deep learning in intrusion detection perspective: Overview and further challenges. IWBIS 2017: 5-10 - [c70]Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim:
Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier. IWBIS 2017: 99-104 - [c69]Jaemin Park, Kwangjo Kim:
TM-Coin: Trustworthy management of TCB measurements in IoT. PerCom Workshops 2017: 654-659 - [c68]Muhamad Erza Aminanto, Kwangjo Kim:
Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning. WISA 2017: 212-223 - [i14]Yi Liu, Kwangjo Kim:
Understanding Web 2.0 service models, applications, reflections, perspectives, and beyond. PeerJ Prepr. 5: e2811 (2017) - 2016
- [j36]Omar Y. Al-Jarrah, Omar Alhussein, Paul D. Yoo, Sami Muhaidat, Kamal Taha, Kwangjo Kim:
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection. IEEE Trans. Cybern. 46(8): 1796-1806 (2016) - [c67]Jong Myoung Kim, Zae Myung Kim, Kwangjo Kim:
An approach to spam comment detection through domain-independent features. BigComp 2016: 273-276 - [c66]Hyo Jin Do, Young-Seob Jeong, Ho-Jin Choi, Kwangjo Kim:
Another dummy generation technique in location-based services. BigComp 2016: 532-538 - [c65]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim:
Revocable Decentralized Multi-Authority Functional Encryption. INDOCRYPT 2016: 248-265 - [c64]Muhamad Erza Aminanto, Kwangjo Kim:
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. WISA 2016: 136-147 - [e4]Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu:
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9543, Springer 2016, ISBN 978-3-319-29813-9 [contents] - 2015
- [j35]Young-joo Shin, Kwangjo Kim:
Differentially private client-side data deduplication protocol for cloud storage services. Secur. Commun. Networks 8(12): 2114-2123 (2015) - [c63]Hakju Kim, Kwangjo Kim:
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function. AsiaJCIS 2015: 110-111 - [c62]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. SECRYPT 2015: 39-52 - 2014
- [j34]Young-joo Shin, Kwangjo Kim:
Efficient and Secure File Deduplication in Cloud Storage. IEICE Trans. Inf. Syst. 97-D(2): 184-197 (2014) - [j33]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. Inf. Sci. 265: 198-210 (2014) - [c61]O. Y. Al-Jarrah, Amna Siddiqui, M. Elsalamouny, Paul D. Yoo, Sami Muhaidat, Kwangjo Kim:
Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection. ICDCS Workshops 2014: 177-181 - 2013
- [j32]Jangseong Kim, Kwangjo Kim:
A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks. Telecommun. Syst. 52(2): 1377-1388 (2013) - [c60]Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung Youl Youm:
Preventing Abuse of Cookies Stolen by XSS. AsiaJCIS 2013: 85-89 - 2012
- [j31]Kyusuk Han, Kwangjo Kim, Wook Choi, Hyo Hyun Choi, Jung-Taek Seo, Taeshik Shon:
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 14(3-4): 251-269 (2012) - [j30]Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong:
Generic security-amplifying methods of ordinary digital signatures. Inf. Sci. 201: 128-139 (2012) - [j29]Jangseong Kim, Kwangjo Kim, Jong Hyuk Park, Taeshik Shon:
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment. Math. Comput. Model. 55(1-2): 45-57 (2012) - [j28]Divyan Munirathnam Konidala, Made Harta Dwijaksara, Kwangjo Kim, Dongman Lee, Byoungcheon Lee, Daeyoung Kim, Soontae Kim:
Resuscitating privacy-preserving mobile payment with customer in complete control. Pers. Ubiquitous Comput. 16(6): 643-654 (2012) - [i13]Young-joo Shin, Junbeom Hur, Kwangjo Kim:
Security weakness in the Proof of Storage with Deduplication. IACR Cryptol. ePrint Arch. 2012: 554 (2012) - 2011
- [j27]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. Comput. Electr. Eng. 37(4): 614-623 (2011) - [j26]Dang Nguyen Duc, Kwangjo Kim:
Defending RFID authentication protocols against DoS attacks. Comput. Commun. 34(3): 384-390 (2011) - [j25]Jangseong Kim, Taeshik Shon, Kwangjo Kim:
Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment. IEICE Trans. Commun. 94-B(3): 686-689 (2011) - [j24]Kyusuk Han, Kwangjo Kim, Taeshik Shon:
Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies. IEICE Trans. Inf. Syst. 94-D(6): 1181-1184 (2011) - [j23]Kyusuk Han, Taeshik Shon, Kwangjo Kim:
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security. IEICE Trans. Commun. 94-B(8): 2235-2238 (2011) - [j22]Kyusuk Han, Kwangjo Kim, Jong Hyuk Park, Taeshik Shon:
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks. IET Commun. 5(12): 1744-1754 (2011) - [j21]Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jong Hyuk Park, Kwangjo Kim:
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. Int. J. Commun. Syst. 24(4): 461-472 (2011) - [j20]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - [c59]Qian Wang, Hai Su, Kui Ren, Kwangjo Kim:
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. INFOCOM 2011: 1422-1430 - 2010
- [j19]Duc-Liem Vo, Hyunrok Lee, Chan Yeob Yeun, Kwangjo Kim:
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings. Comput. Electr. Eng. 36(1): 155-159 (2010) - [j18]Dang Nguyen Duc, Kwangjo Kim:
On the Security of RFID Group Scanning Protocols. IEICE Trans. Inf. Syst. 93-D(3): 528-530 (2010) - [j17]Jin Li, Kwangjo Kim:
Hidden attribute-based signatures without anonymity revocation. Inf. Sci. 180(9): 1681-1689 (2010) - [j16]Kyusuk Han, Kwangjo Kim, Taeshik Shon:
Untraceable Mobile Node Authentication in WSN. Sensors 10(5): 4410-4429 (2010) - [j15]Kyusuk Han, Taeshik Shon, Kwangjo Kim:
Efficient mobile sensor authentication in smart home and WPAN. IEEE Trans. Consumer Electron. 56(2): 591-596 (2010) - [c58]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. ACISP 2010: 200-215 - [c57]Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Shon:
Efficient sensor node authentication via 3GPP mobile communication networks. CCS 2010: 687-689 - [c56]Jangseong Kim, Joonsang Baek, Kwangjo Kim, Jianying Zhou:
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. EuroPKI 2010: 45-60 - [c55]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311 - [c54]Dang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun:
Reconsidering Ryu-Takagi RFID authentication protocol. ICITST 2010: 1-6
2000 – 2009
- 2009
- [j14]Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim:
The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009) - [c53]Syed Ali Raza Zaidi, Maryam Hafeez, Syed A. Khayam, Desmond C. McLernon, Mounir Ghogho, Kwangjo Kim:
On minimum cost coverage in wireless sensor networks. CISS 2009: 213-218 - [c52]Dang Nguyen Duc, Hyunrok Lee, Divyan M. Konidala, Kwangjo Kim:
Open issues in RFID security. ICITST 2009: 1-5 - [c51]Hyewon Park, Zeen Kim, Kwangjo Kim:
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. SECURWARE 2009: 274-279 - [c50]Hyeran Mun, Kyusuk Han, Kwangjo Kim:
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. WTS 2009: 1-8 - [i12]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems. IACR Cryptol. ePrint Arch. 2009: 35 (2009) - [i11]Jin Li, Kui Ren, Kwangjo Kim:
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. IACR Cryptol. ePrint Arch. 2009: 118 (2009) - [i10]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme Without Key Exposure. IACR Cryptol. ePrint Arch. 2009: 400 (2009) - [i9]Dang Nguyen Duc, Kwangjo Kim:
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction. IACR Cryptol. ePrint Arch. 2009: 609 (2009) - [i8]Dang Nguyen Duc, Kwangjo Kim:
Security Analysis of A Remote User Authentication Protocol by Liao and Wang. IACR Cryptol. ePrint Arch. 2009: 610 (2009) - 2008
- [j13]Duc-Liem Vo, Kwangjo Kim:
A secure mutual authentication scheme with key agreement using smart card from bilinear pairings. Comput. Syst. Sci. Eng. 23(3) (2008) - [j12]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) - [j11]Chan Yeob Yeun, Kyusuk Han, Duc-Liem Vo, Kwangjo Kim:
Secure authenticated group key agreement protocol in the MANET environment. Inf. Secur. Tech. Rep. 13(3): 158-164 (2008) - [c49]Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures. ACNS 2008: 224-241 - [i7]Jin Li, Kwangjo Kim:
Attribute-Based Ring Signatures. IACR Cryptol. ePrint Arch. 2008: 394 (2008) - 2007
- [j10]Duc-Liem Vo, Kwangjo Kim:
Security Analysis of an ID-Based Key Agreement for Peer Group Communication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(11): 2624-2625 (2007) - [c48]Sungchul Heo, Zeen Kim, Kwangjo Kim:
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups. GLOBECOM 2007: 464-468 - [c47]Jangseong Kim, Zeen Kim, Kwangjo Kim:
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. ICISC 2007: 37-48 - [c46]Jin Li, Tsz Hon Yuen, Kwangjo Kim:
Practical Threshold Signatures Without Random Oracles. ProvSec 2007: 198-207 - [c45]Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ProvSec 2007: 208-217 - 2006
- [j9]Kui Ren, Wenjing Lou, Kwangjo Kim, Robert H. Deng:
A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans. Veh. Technol. 55(4): 1373-1384 (2006) - [c44]Youngjoon Seo, Hyunrok Lee, Kwangjo Kim:
A Scalable and Untraceable Authentication Protocol for RFID. EUC Workshops 2006: 252-261 - [c43]Divyan M. Konidala, Kwangjo Kim:
Mobile RFID Applications and Security Challenges. ICISC 2006: 194-205 - 2005
- [j8]Fangguo Zhang, Kwangjo Kim:
Cryptanalysis of Lee-Hwang-Li's key authentication scheme. Appl. Math. Comput. 161(1): 101-107 (2005) - [j7]Jiqiang Lv, Xinmei Wang, Kwangjo Kim:
Security of a multisignature scheme for specified group of verifiers. Appl. Math. Comput. 166(1): 58-63 (2005) - [j6]Jiqiang Lv, Xinmei Wang, Kwangjo Kim:
Practical convertible authenticated encryption schemes using self-certified public keys. Appl. Math. Comput. 169(2): 1285-1297 (2005) - [c42]Duc-Liem Vo, Kwangjo Kim:
Yet Another Forward Secure Signature from Bilinear Pairings. ICISC 2005: 441-455 - [c41]Jaemin Park, Zeen Kim, Kwangjo Kim:
State-based key management scheme for wireless sensor networks. MASS 2005 - [c40]Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, Kwangjo Kim:
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments. PerCom Workshops 2005: 136-140 - 2004
- [j5]Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks. Comput. Networks 45(6): 687-699 (2004) - [c39]SungJun Min, Go Yamamoto, Kwangjo Kim:
Weak Property of Malleability in NTRUSign. ACISP 2004: 379-390 - [c38]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings. ACNS 2004: 135-148 - [c37]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography. ACSW 2004: 69-74 - [c36]Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine:
Threshold Password-Based Authentication Using Bilinear Pairings. EuroPKI 2004: 350-363 - [c35]Divyan M. Konidala, Chan Yeob Yeun, Kwangjo Kim:
A secure and privacy enhanced protocol for location-based services in ubiquitous society. GLOBECOM 2004: 2164-2168 - [c34]Kui Ren, Hyunrok Lee, Kyusuk Han, Jaemin Park, Kwangjo Kim:
An enhanced lightweight authentication protocol for access control in wireless LANs. ICON 2004: 444-450 - [c33]Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim:
New ID-Based Threshold Signature Scheme from Bilinear Pairings. INDOCRYPT 2004: 371-383 - [c32]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing Without Key Exposure. ISC 2004: 87-98 - [c31]Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo:
Efficient Authenticated Key Agreement Protocol for Dynamic Groups. WISA 2004: 144-159 - [i6]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing without Key Exposure. IACR Cryptol. ePrint Arch. 2004: 38 (2004) - 2003
- [j4]Fangguo Zhang, Kwangjo Kim:
A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(2): 515-516 (2003) - [c30]Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim:
Practical Pay TV Schemes. ACISP 2003: 192-203 - [c29]Fangguo Zhang, Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. ACISP 2003: 312-323 - [c28]Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu:
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. ACNS 2003: 357-371 - [c27]SuGil Choi, Kwangjo Kim:
Authentication and payment protocol preserving location privacy in mobile IP. GLOBECOM 2003: 1410-1414 - [c26]Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim:
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. ICICS 2003: 11-21 - [c25]Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings. ICICS 2003: 249-259 - [c24]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258 - [c23]Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. ICISC 2003: 259-273 - [c22]Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:
On the Power of Computational Secret Sharing. INDOCRYPT 2003: 162-176 - [c21]SuGil Choi, Kwangjo Kim, ByeongGon Kim:
Practical Solution for Location Privacy in Mobile IPv6. WISA 2003: 69-83 - [i5]Fangguo Zhang, Kwangjo Kim:
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme. IACR Cryptol. ePrint Arch. 2003: 11 (2003) - [i4]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
A New ID-based Group Signature Scheme from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2003: 116 (2003) - 2002
- [j3]Manho Lee, Gookwhan Ahn, Jinho Kim, Jaegwan Park, Byoungcheon Lee, Kwangjo Kim, Hyuckjae Lee:
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem. J. Commun. Networks 4(2): 81-89 (2002) - [c20]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. ACISP 2002: 203-213 - [c19]Myungsun Kim, Kwangjo Kim:
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. ACISP 2002: 362-378 - [c18]Fangguo Zhang, Kwangjo Kim:
ID-Based Blind Signature and Ring Signature from Pairings. ASIACRYPT 2002: 533-547 - [c17]Myungsun Kim, Jongseong Kim, Kwangjo Kim:
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. ICICS 2002: 97-108 - [c16]Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. ICISC 2002: 389-406 - [c15]Byoungcheon Lee, Kwangjo Kim:
Self-certified Signatures. INDOCRYPT 2002: 199-214 - [e3]Kwangjo Kim:
Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings. Lecture Notes in Computer Science 2288, Springer 2002, ISBN 3-540-43319-8 [contents] - [i3]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. IACR Cryptol. ePrint Arch. 2002: 122 (2002) - [i2]Fangguo Zhang, Kwangjo Kim:
Cryptanalysis of Two New Signature Schemes. IACR Cryptol. ePrint Arch. 2002: 167 (2002) - [i1]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433). IACR Cryptol. ePrint Arch. 2002: 178 (2002) - 2001
- [j2]Gail-Joon Ahn, Kwangjo Kim:
CONUGA: Constrained User-Group Assignment. J. Netw. Comput. Appl. 24(2): 87-100 (2001) - [c14]Byoungcheon Lee, Heesun Kim, Kwangjo Kim:
Secure Mobile Agent Using Strong Non-designated Proxy Signature. ACISP 2001: 474 - [c13]Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang:
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. ICISC 2001: 39-49 - [c12]Jinho Kim, Kwangjo Kim, Chulsoo Lee:
An Efficient and Provably Secure Threshold Blind Signature. ICISC 2001: 318-327 - [c11]Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma:
Efficient Public Auction with One-Time Registration and Public Verifiability. INDOCRYPT 2001: 162-174 - [e2]Kwangjo Kim:
Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings. Lecture Notes in Computer Science 1992, Springer 2001, ISBN 3-540-41658-7 [contents] - 2000
- [c10]Joonsang Baek, Byoungcheon Lee, Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. ACISP 2000: 49-58 - [c9]Byoungcheon Lee, Kwangjo Kim:
Secure Matchmaking Protocol. ICISC 2000: 123-134 - [c8]Boyeon Song, Kwangjo Kim:
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. INDOCRYPT 2000: 237-249 - [c7]Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn:
Tapping Alert Protocol. WETICE 2000: 159-164
1990 – 1999
- 1999
- [c6]Moonseog Seo, Kwangjo Kim:
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. ICISC 1999: 269-277 - [c5]Kwangjo Kim, Sangjoon Park, Joonsang Baek:
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. ICPP Workshops 1999: 140-145 - 1997
- [j1]Sung-Mo Park, Sangjin Lee, Soo Hak Sung, Kwangjo Kim:
Improving Bounds for the Number of Correlation Immune Boolean Functions. Inf. Process. Lett. 61(4): 209-212 (1997) - [c4]Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won:
Two efficient RSA multisignature schemes. ICICS 1997: 217-222 - 1996
- [e1]Kwangjo Kim, Tsutomu Matsumoto:
Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings. Lecture Notes in Computer Science 1163, Springer 1996, ISBN 3-540-61872-4 [contents] - 1994
- [c3]Seongtaek Chee, Sangjin Lee, Kwangjo Kim:
Semi-bent Functions. ASIACRYPT 1994: 107-118 - 1991
- [c2]Kwangjo Kim:
Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. ASIACRYPT 1991: 59-72 - 1990
- [c1]Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai:
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. CRYPTO 1990: 564-574
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint