Follow
Jeeyeon Kim
Jeeyeon Kim
consultant
Verified email at daum.net
Title
Cited by
Cited by
Year
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
International Conference on Computational Science and Its Applications, 895-902, 2004
632004
An enhanced secure authentication scheme with anonymity for wireless environments
W Jeon, J Kim, J Nam, Y Lee, D Won
IEICE Transactions on Communications 95 (7), 2505-2508, 2012
262012
Analysis of Threats and Countermeasures on Mobile Smartphone
WR Jeon, JY Kim, YS Lee, DH Won
Journal of The Korea Society of Computer and Information 16 (2), 153-163, 2011
142011
Design of a simple user authentication scheme using QR-code for mobile device
Y Lee, J Kim, W Jeon, D Won
Information Technology Convergence, Secure and Trust Computing, and Data …, 2012
112012
Security analysis of authentication scheme for wireless communications with user anonymity
W Jeon, J Kim, Y Lee, D Won
Information technology convergence, secure and trust computing, and data …, 2012
92012
Security issues and threats according to the attribute of cloud computing
H Lee, J Kim, Y Lee, D Won
Computer Applications for Security, Control and System Engineering, 101-108, 2012
72012
Forward-secure commercial key escrow systems
J Kim, S Kim, H Kwon, S Lee, S Park, D Won
Proceedings Tenth IEEE International Workshop on Enabling Technologies …, 2001
62001
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment
Y Lee, J Kim, D Won
Symposium on Human Interface, 321-329, 2011
42011
Server-aided password-authenticated key exchange: from 3-party to group
J Nam, J Paik, J Kim, Y Lee, D Won
Symposium on Human Interface, 339-348, 2011
32011
Group key agreement protocol among mobile devices in different cells
J Kim, S Kim, K Chun, J Lee, D Won
International Symposium on Parallel and Distributed Processing and …, 2006
32006
Security controls based on K-ISMS in cloud computing service
J Mun, Y Jung, J Kim, Y Lee, K Park, D Won
Advances in Computer Science and its Applications, 391-404, 2014
22014
Security analysis on digital signature function implemented in PDF software
S Park, C Lee, K Lee, J Kim, Y Lee, D Won
International Conference on Future Generation Information Technology, 327-334, 2011
22011
An improvement of VeriSign’s key roaming service protocol
J Kim, H Kwon, H Park, S Kim, D Won
International Conference on Web Engineering, 281-288, 2003
22003
Yi et al.s Group Key Exchange Protocol: A Security Vulnerability and its Remediation
YS Lee, JY Kim, DH Won
Journal of the Korea Society of Computer and Information 17 (4), 91-98, 2012
12012
Vulnerability Analysis on Digital Signature Function of Word Processors
CB Lee, SW Park, KW Lee, JY Kim, JH Nam, YS Lee, DH Won
Journal of the Korea Society of Computer and Information 16 (8), 109-118, 2011
12011
전자문서 소프트웨어의전자서명 기능에 대한 안전성 분석
S Park, C Lee, K Lee, J Kim, Y Lee, D Won
1*
Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks
Y Lee, J Kim, D Won
Computer Science and its Applications, 707-714, 2012
2012
Security Analysis on Digital Signature Function Implemented in Electronic Documents Software
S Park, C Lee, K Lee, J Kim, Y Lee, D Won
Journal of the Korea Institute of Information Security and Cryptology 22 (5 …, 2012
2012
Terrestrial Wireless Communication/Broadcasting Technologies-An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
W Jeon, J Kim, J Nam, Y Lee, D Won
IEICE Transactions on Communications 95 (7), 2505, 2012
2012
An Efficient Mixnet for Electronic Voting Systems
WR Jeon, JY Kim, YS Lee, DH Won
Journal of the Korea Institute of Information Security and Cryptology 22 (1 …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20