Follow
Kwangwoo Lee
Kwangwoo Lee
Security Architect, HP Inc.
Verified email at hp.com
Title
Cited by
Cited by
Year
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
H Kim, W Jeon, K Lee, Y Lee, D Won
International Conference on Computational Science and Its Applications, 391-406, 2012
692012
A mobile based anti-phishing authentication scheme using QR code
K Choi, C Lee, W Jeon, K Lee, D Won
Mobile IT Convergence (ICMIC), 2011 International Conference on, 109-113, 2011
692011
Construction of a secure two-factor user authentication system using fingerprint information and password
W Go, K Lee, J Kwak
Journal of Intelligent Manufacturing 25 (2), 217-230, 2014
302014
Protection profile for secure e-voting systems
K Lee, Y Lee, D Won, S Kim
International Conference on Information Security Practice and Experience …, 2010
202010
Verification method for operation of encryption apparatus and its application to electronic voting
Y Lee, K Lee, S Kim, D Won
US Patent 7,882,038, 2011
102011
Internet Based E-Will Management System Using Certificate and Method Thereof
K Lee, D Won, S Kim
US Patent App. 12/775,352, 2011
92011
A secure and efficient E-Will system based on PKI
K Lee, D Won, S Kim
Information 14 (7), 2187-2206, 2011
92011
Vulnerabilities Analysis of the OTP Implemented on a PC
WC Hong, KW Lee, SJ Kim, DH Won
The KIPS Transactions: PartC 17 (4), 361-370, 2010
92010
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System
HJ Lee, K Lee, D Won
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 …, 2011
82011
Study on A secure remote user authentication scheme using smart cards
J Qiuyan, K Lee, D Won
International Journal of Security and Its Applications 7 (2), 105-116, 2013
62013
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard
C Lee, S Park, K Lee, D Won
International Conference on Hybrid Information Technology, 488-495, 2011
62011
Security analysis on anonymous mutual authentication protocol for RFID tag without back-end database and its improvement
S Kim, K Lee, S Kim, D Won
World Acad Sci Eng Technol, 460-464, 2009
62009
Cryptanalysis of a two-factor user authentication scheme over insecure channels
J Qiuyan, K Lee, D Won
ISA 2012, 2012
52012
Malware Variant Detection and Classification Using Control Flow Graph
D Shin, K Lee, D Won
International Conference on Hybrid Information Technology, 174-181, 2011
52011
An improved protocol for server-aided authenticated group key establishment
J Nam, J Paik, B Lee, K Lee, D Won
International Conference on Computational Science and Its Applications, 437-446, 2011
52011
Security improvement on a group key exchange protocol for mobile networks
J Nam, K Lee, J Paik, W Paik, D Won
International Conference on Computational Science and Its Applications, 123-132, 2011
52011
Efficient voter verifiable e-voting schemes with cryptographic receipts
Y Lee, K Lee, S Kim, D Won
Proc. of IAVoSS Workshop On Trustworthy Election (WOTE 2006), Cambridge …, 2006
52006
Cryptanalysis of a secure remote user authentication scheme
J Qiuyan, KW Lee, DH Won
The Journal of Korean Institute of Communications and Information Sciences …, 2012
42012
Enhanced code-signing scheme for smartphone applications
I Jeun, K Lee, D Won
International Conference on Future Generation Information Technology, 353-360, 2011
32011
Information technology security evaluation using CERT c secure coding standard
T Lee, K Lee, D Won, N Park
International Conference on Future Generation Information Technology, 335-342, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20