Takip et
Dongho Won
Dongho Won
Diğer adlar원 동호
Sungkyunkwan University
security.re.kr üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
7811997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
3682005
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
Y Choi, D Lee, J Kim, J Jung, J Nam, D Won
Sensors 14 (6), 10081-10106, 2014
2572014
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Advanced Web and Network Technologies, and Applications: APWeb 2006 …, 2006
2252006
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE transactions on Power delivery 24 (3), 1154-1163, 2009
1422009
A practical analysis of smartphone security
W Jeon, J Kim, Y Lee, D Won
Symposium on Human Interface, 311-320, 2011
1372011
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2009
1082009
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
J Kim, D Lee, W Jeon, Y Lee, D Won
Sensors 14 (4), 6443-6462, 2014
972014
Security requirements of a mobile device management system
K Rhee, W Jeon, D Won
International Journal of Security and Its Applications 6 (2), 353-358, 2012
962012
Convertible group signatures
SJ Kim, SJ Park, DH Won
Advances in Cryptology—ASIACRYPT'96: International Conference on the Theory …, 1996
941996
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
902011
A practical study on advanced persistent threats
I Jeun, Y Lee, D Won
Computer Applications for Security, Control and System Engineering …, 2012
872012
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
852007
An off-line dictionary attack on a simple three-party key exchange protocol
J Nam, J Paik, HK Kang, UM Kim, D Won
IEEE Communications Letters 13 (3), 205-207, 2009
842009
ID-based group signature
Park, Won
Electronics Letters 33 (19), 1616-1617, 1997
821997
Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks
J Jung, J Moon, D Lee, D Won
Sensors 17 (3), 644, 2017
792017
A mobile based anti-phishing authentication scheme using QR code
K Choi, C Lee, W Jeon, K Lee, D Won
International Conference on Mobile IT Convergence, 109-113, 2011
762011
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
J Nam, KKR Choo, S Han, M Kim, J Paik, D Won
Plos one 10 (4), e0116709, 2015
732015
Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction
Y Choi, Y Lee, D Won
International Journal of Distributed Sensor Networks 12 (1), 8572410, 2016
722016
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
702005
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20