Junghyun Nam
Orcid: 0009-0003-6427-2013
According to our database1,
Junghyun Nam
authored at least 74 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
1
3
3
7
3
3
2
1
2
2
4
4
3
5
1
1
5
3
4
6
4
5
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the SIGGRAPH Asia 2023 Technical Communications, 2023
2021
Understanding of the Quality of Computer-Mediated Communication Technology in the Context of Business Planning.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2016
IEEE Trans. Instrum. Meas., 2016
KSII Trans. Internet Inf. Syst., 2016
Informing Sci. Int. J. an Emerg. Transdiscipl., 2016
2015
Symmetry, 2015
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015
2014
Sensors, 2014
Sensors, 2014
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014
KSII Trans. Internet Inf. Syst., 2014
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014
2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
J. Inf. Sci. Eng., 2012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
KSII Trans. Internet Inf. Syst., 2012
IEICE Trans. Commun., 2012
2011
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol.
Inf. Sci., 2011
Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
2010
IACR Cryptol. ePrint Arch., 2010
2009
J. Inf. Sci. Eng., 2009
IEEE Commun. Lett., 2009
Proceedings of the 2009 IEEE/INFORMS International Conference on Service Operations, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009
2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
A New Wafer Level Latent Defect Screening Methodology for Highly Reliable DRAM Using a Response Surface Method.
Proceedings of the 2008 IEEE International Test Conference, 2008
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
IACR Cryptol. ePrint Arch., 2007
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Topics in Cryptology, 2007
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
J. Commun. Networks, 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.
IEEE Commun. Lett., 2005
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.
IACR Cryptol. ePrint Arch., 2005
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Trust, 2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Computational Science and Its Applications, 2004
2001
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2001