Dongho Won
Orcid: 0000-0002-5208-1338
According to our database1,
Dongho Won
authored at least 261 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024
IEEE Internet Things J., February, 2024
2023
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.
Sensors, February, 2023
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
2022
IEEE Access, 2022
Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme.
IEEE Access, 2022
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022
Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022
2021
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
2020
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems.
Sensors, 2020
A three-factor anonymous user authentication scheme for Internet of Things environments.
J. Inf. Secur. Appl., 2020
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
2018
Sensors, 2018
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018
Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme.
Proceedings of the 2018 International Conference on Information Networking, 2018
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
Proceedings of the 2018 International Conference on Information Networking, 2018
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018
Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018
2017
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
Sensors, 2017
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
Sensors, 2017
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Secur. Commun. Networks, 2017
J. Softw., 2017
Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
KSII Trans. Internet Inf. Syst., 2017
Int. J. Netw. Secur., 2017
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017
2016
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
Sensors, 2016
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
Sensors, 2016
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
Secur. Commun. Networks, 2016
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
J. Sensors, 2016
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2016
J. Comput., 2016
KSII Trans. Internet Inf. Syst., 2016
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.
Int. J. Distributed Sens. Networks, 2016
IEICE Trans. Inf. Syst., 2016
Improvement and Weakness of <i>Zero-Sum Defender</i> against Return-Oriented Programming Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Performance and security enhanced authentication and key agreement protocol for SAE/LTE network.
Comput. Networks, 2016
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
Symmetry, 2015
Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE).
Symmetry, 2015
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.
Int. J. Distributed Sens. Networks, 2015
Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property.
IEICE Trans. Commun., 2015
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015
Cryptanalysis of biometric-based multi-server authentication scheme using smart card.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015
Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
Sensors, 2014
Sensors, 2014
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System.
IACR Cryptol. ePrint Arch., 2014
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Password-based single-file encryption and secure data deletion for solid-state drive.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013
Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea.
J. Softw., 2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Electron. Commer. Res., 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
A secure user-friendly authentication scheme with anonymity for wireless communications.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
J. Inf. Sci. Eng., 2012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
KSII Trans. Internet Inf. Syst., 2012
IEICE Trans. Commun., 2012
IEICE Trans. Commun., 2012
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Third FTRA International Conference on Mobile, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques.
Proceedings of the Convergence and Hybrid Information Technology, 2012
Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.
Proceedings of the CUBE International IT Conference & Exhibition, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
KSII Trans. Internet Inf. Syst., 2011
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol.
Inf. Sci., 2011
Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols.
Proceedings of the Web Information Systems and Mining - International Conference, 2011
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the Convergence and Hybrid Information Technology, 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File.
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
USN Middleware Access Control of Sensor Network and Selective Encryption of Information.
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the 6th International Conference on Future Internet Technologies, 2011
2010
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
J. Inf. Sci. Eng., 2010
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.
Comput. Electr. Eng., 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010
2009
J. Inf. Sci. Eng., 2009
IEEE Commun. Lett., 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Information Security Practice and Experience, 2009
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.
Proceedings of the Computational Science and Its Applications, 2009
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of the Computational Science and Its Applications, 2009
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of the Communication and Networking, 2009
Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009
Fingerprint Based Secure Authentication Protocol using OTP in e-Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Security Weaknesses in Chang and Wu's Key Agreement Protocol for a Multi-Server Environment.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
J. Commun. Networks, 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
J. Inf. Process. Syst., 2005
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.
IEEE Commun. Lett., 2005
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.
IACR Cryptol. ePrint Arch., 2005
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Trust, 2005
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
Proceedings of the Computational Science and Its Applications, 2004
A Study on Security Risk Modeling over Information and Communication Infrastructure.
Proceedings of the International Conference on Security and Management, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Information Networking, 2003
Proceedings of the Computational Science and Its Applications, 2003
On Differential Power Analysis Attack on the Addition Modular 2<sup>N</sup> Operation of Smart Cards.
Proceedings of the International Conference on Security and Management, 2003
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Information Security and Cryptology, 2001
2000
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors.
Proceedings of the Information Security and Cryptology, 2000
1999
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.
Proceedings of the Information Security and Cryptology, 1999
1998
One-time self-certified public keys, revisited.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996