Seungjoo Kim
Orcid: 0000-0002-2157-0403
According to our database1,
Seungjoo Kim
authored at least 122 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment.
CoRR, 2024
Development for High-Assurance Software Update Management System Complying With UN R156.
IEEE Access, 2024
IEEE Access, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
2023
Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies.
Concurr. Comput. Pract. Exp., 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2022
J. Ambient Intell. Humaniz. Comput., 2022
IEEE Access, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
2020
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains.
IACR Cryptol. ePrint Arch., 2020
Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain.
IEEE Access, 2020
Proceedings of the CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the IEEE INFOCOM 2019, 2019
2018
Secur. Commun. Networks, 2018
2017
Wirel. Pers. Commun., 2017
How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability.
Symmetry, 2017
2016
A novel security architecture of electronic vehicle system for smart grid communication.
J. Supercomput., 2016
Int. J. Distributed Sens. Networks, 2016
2015
Peer-to-Peer Netw. Appl., 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
2013
Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea.
J. Softw., 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
2012
Inf. Sci., 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.
Proceedings of the CUBE International IT Conference & Exhibition, 2012
2011
KSII Trans. Internet Inf. Syst., 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
2010
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
J. Inf. Sci. Eng., 2010
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.
Comput. Electr. Eng., 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010
2009
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Information Security Practice and Experience, 2009
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of the Computational Science and Its Applications, 2009
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of the Communication and Networking, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008
2007
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices.
IEEE Commun. Lett., 2005
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing.
IACR Cryptol. ePrint Arch., 2005
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Trust, 2005
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computational Science and Its Applications, 2004
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
Proceedings of the Computational Science and Its Applications, 2004
2003
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Topics in Cryptology, 2003
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Progress in Cryptology, 2001
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
2000
A Generalized Takagi-Cryptosystem with a modulus of the form <i>p<sup>r</sup>q<sup>s</sup></i>.
Proceedings of the Progress in Cryptology, 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
One-time self-certified public keys, revisited.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996