Follow
Seungjoo Kim
Seungjoo Kim
Other namesSeung Joo Kim
Professor at the School of Cybersecurity in Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
7811997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
3602005
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Advanced Web and Network Technologies, and Applications: APWeb 2006 …, 2006
2112006
A countermeasure against one physical cryptanalysis may benefit another attack
Y Sung-Ming, S Kim, S Lim, S Moon
Information Security and Cryptology—ICISC 2001: 4th International …, 2002
1862002
RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
SM Yen, S Kim, S Lim, SJ Moon
IEEE Transactions on computers 52 (4), 461-472, 2003
1842003
An analysis of proxy signatures: Is a secure channel necessary?
JY Lee, JH Cheon, S Kim
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
1612003
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE transactions on Power delivery 24 (3), 1154-1163, 2009
1352009
RSA speedup with residue number system immune against hardware fault cryptanalysis
Y Sung-Ming, S Kim, S Lim, S Moon
Information Security and Cryptology—ICISC 2001: 4th International …, 2002
1102002
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2009
1062009
Convertible group signatures
SJ Kim, SJ Park, DH Won
Advances in Cryptology—ASIACRYPT'96: International Conference on the Theory …, 1996
921996
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
892011
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
842007
Zero-knowledge nominative signatures
S Kim
Proc. Ragocrypt'96, International Conference on the Theory and Application …, 1996
821996
ID-based group signature
S Park, S Kim, D Won
Electronics Letters 33 (19), 1616-1616, 1997
801997
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
682005
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
Computational Science and Its Applications–ICCSA 2004: International …, 2004
632004
Forward-secure commercial key escrow systems and escrowing methods thereof
J Kim, S Kim, HJ Kwon, HR Park, H Lee
US Patent App. 09/997,012, 2003
632003
A Generalized Takagi-Cryptosystem with a Modulus of the Form prqs
S Lim, S Kim, I Yie, H Lee
Progress in Cryptology—INDOCRYPT 2000: First International Conference in …, 2000
492000
Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol
H Jo, Y Lee, M Kim, S Kim, D Won
2009 Fifth International Joint Conference on INC, IMS and IDC, 618-621, 2009
462009
Secure Data Deletion for USB Flash Memory.
B Lee, K Son, D Won, S Kim
J. Inf. Sci. Eng. 27 (3), 933-952, 2011
452011
The system can't perform the operation now. Try again later.
Articles 1–20