Off-line keyword guessing attacks on recent keyword search schemes over encrypted data JW Byun, HS Rhee, HA Park, DH Lee Workshop on secure data management, 75-83, 2006 | 500 | 2006 |
Password-authenticated key exchange between clients with different passwords JW Byun, IR Jeong, DH Lee, CS Park Information and Communications Security: 4th International Conference, ICICS …, 2002 | 138 | 2002 |
Efficient conjunctive keyword search on encrypted data storage system JW Byun, DH Lee, J Lim European Public Key Infrastructure Workshop, 184-196, 2006 | 136 | 2006 |
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement JW Byun, DH Lee, JI Lim Information Sciences 177 (19), 3995-4013, 2007 | 93 | 2007 |
N-party encrypted Diffie-Hellman key exchange using different passwords JW Byun, DH Lee Applied Cryptography and Network Security: Third International Conference …, 2005 | 54 | 2005 |
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol JW Byun, DH Lee, JI Lim IEEE Communications Letters 10 (9), 683-685, 2006 | 40 | 2006 |
Efficient and provably secure client-to-client password-based key exchange protocol JW Byun, DH Lee, J Lim Asia-Pacific Web Conference, 830-836, 2006 | 36 | 2006 |
On a security model of conjunctive keyword search over encrypted relational database JW Byun, DH Lee Journal of Systems and Software 84 (8), 1364-1372, 2011 | 31 | 2011 |
Secure index search for groups HA Park, JW Byun, DH Lee International conference on trust, privacy and security in digital business …, 2005 | 31 | 2005 |
End-to-end authenticated key exchange based on different physical unclonable functions JW Byun IEEE Access 7, 102951-102965, 2019 | 27 | 2019 |
Constant-round password-based group key generation for multi-layer ad-hoc networks JW Byun, SM Lee, DH Lee, D Hong International Conference on Security in Pervasive Computing, 3-17, 2006 | 26 | 2006 |
Oblivious conjunctive keyword search HS Rhee, JW Byun, DH Lee, J Lim International Workshop on Information Security Applications, 318-327, 2005 | 21 | 2005 |
Password-based group key exchange secure against insider guessing attacks JW Byun, DH Lee, J Lim International Conference on Computational and Information Science, 143-148, 2005 | 17 | 2005 |
Privacy preserving smartcard‐based authentication system with provable security JW Byun Security and Communication Networks 8 (17), 3028-3044, 2015 | 16 | 2015 |
Difference set attacks on conjunctive keyword search schemes HS Rhee, IR Jeong, JW Byun, DH Lee Workshop on Secure Data Management, 64-74, 2006 | 15 | 2006 |
An efficient multi-factor authenticated key exchange with physically unclonable function JW Byun 2019 International Conference on Electronics, Information, and Communication …, 2019 | 10 | 2019 |
A generic multifactor authenticated key exchange with physical unclonable function JW Byun Security and Communication Networks 2019 (1), 5935292, 2019 | 9 | 2019 |
Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones JY Jeong, JW Byun, IR Jeong IEEE Access 10, 17134-17144, 2022 | 7 | 2022 |
PDAKE: a provably secure PUF-based device authenticated key exchange in cloud setting JW Byun IEEE Access 7, 181165-181177, 2019 | 7 | 2019 |
Password-authenticated key agreement between clients with different passwords, working draft of ISO J Byun, I Jeong, D Lee, C Park IEC, 2003 | 5 | 2003 |