Kwangjo Kim
Orcid: 0000-0001-5878-1514
According to our database1,
Kwangjo Kim
authored at least 137 papers
between 1990 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2022
Multi-Class Intrusion Detection Using Two-Channel Color Mapping in IEEE 802.11 Wireless Network.
IEEE Access, 2022
2021
Springer, ISBN: 978-981-16-3763-6, 2021
2020
IEICE Trans. Inf. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Privacy-Preserving Deep Learning on Machine Learning as a Service - a Comprehensive Survey.
IEEE Access, 2020
A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures.
IEEE Access, 2020
IEEE Access, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Springer, ISBN: 978-981-13-1443-8, 2018
2017
Understanding Web 2.0 service models, applications, reflections, perspectives, and beyond.
PeerJ Prepr., 2017
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the International Workshop on Big Data and Information Security, 2017
Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier.
Proceedings of the International Workshop on Big Data and Information Security, 2017
2016
IEEE Trans. Cybern., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016
2015
Differentially private client-side data deduplication protocol for cloud storage services.
Secur. Commun. Networks, 2015
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Inf. Sci., 2014
IEICE Trans. Inf. Syst., 2014
Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
2013
A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks.
Telecommun. Syst., 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Pers. Ubiquitous Comput., 2012
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012
IACR Cryptol. ePrint Arch., 2012
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
2011
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011
Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Trans. Commun., 2011
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Trans. Commun., 2011
IEICE Trans. Inf. Syst., 2011
Comput. Electr. Eng., 2011
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
IEEE Trans. Consumer Electron., 2010
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings.
Comput. Electr. Eng., 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Inf. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction.
IACR Cryptol. ePrint Arch., 2009
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA.
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
2008
Inf. Secur. Tech. Rep., 2008
Inf. Sci., 2008
A secure mutual authentication scheme with key agreement using smart card from bilinear pairings.
Comput. Syst. Sci. Eng., 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Provable Security, 2007
Proceedings of the Provable Security, 2007
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Global Communications Conference, 2007
2006
A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Practical convertible authenticated encryption schemes using self-certified public keys.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
Comput. Networks, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
A secure and privacy enhanced protocol for location-based services in ubiquitous society.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem.
J. Commun. Networks, 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Information Security and Cryptology, 2000
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Information Security and Cryptology, 1999
1997
Inf. Process. Lett., 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990