Juryon Paik
Orcid: 0000-0002-0564-6412
According to our database1,
Juryon Paik
authored at least 36 papers
between 2005 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2015
Symmetry, 2015
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015
2014
Sensors, 2014
Sensors, 2014
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014
2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
J. Inf. Sci. Eng., 2012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
KSII Trans. Internet Inf. Syst., 2012
2011
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol.
Inf. Sci., 2011
Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Future Generation Information Technology, 2011
2009
J. Inf. Sci. Eng., 2009
IEEE Commun. Lett., 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009
2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science, 2006
2005
Proceedings of the First Internaltional Workshop on Personalized Context Modeling and Management for UbiComp Applications, 2005
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science, 2005