Follow
Jonguk Kim
Jonguk Kim
National Security Research Institute (NSR)
Verified email at nsr.re.kr
Title
Cited by
Cited by
Year
Polynomial-based key management for secure intra-group and inter-group communication
Y Piao, JU Kim, U Tariq, M Hong
Computers & Mathematics with Applications 65 (9), 1300-1309, 2013
752013
Method for web service user authentication
MP Hong, JU Kim, SI Kang
US Patent 9,208,304, 2015
172015
Method for generating dynamic group key
MP Hong, JU Kim, SI Kang
US Patent 8,553,887, 2013
132013
Button‐based method for the prevention of near field communication relay attacks
S Kang, J Kim, M Hong
International Journal of Communication Systems 28 (10), 1628-1639, 2015
102015
Autonomous defense against Flooding-based Denial of Service of a SIP system
J Kim, B Roh, M Hong, S Kang, S Lee
2010 IEEE Long Island Systems, Applications and Technology Conference, 1-7, 2010
72010
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices
S Kang, J Kim, M Hong
Personal and ubiquitous computing 17, 933-943, 2013
32013
Relay attack prevention with a single button for near field communication
S Kang, J Kim, M Hong
Proceedings of the FTRA AIM, 86-87, 2013
22013
A graphic password scheme using Eulerian path
GY Moon, JU Kim, MP Hong
Proceedings of the Korean Information Science Society Conference, 82-85, 2011
22011
EDGAR: Extended Dynamic Group-Key AgReement
J Kim, S Kang, M Hong, S Lee
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2010
12010
A Smart Phone Evil Twin Detection Method Using IP Address
YS Jeong, JU Kim, SI Kang, MP Hong
Proceedings of the Korean Information Science Society Conference, 269-271, 2012
2012
Key Exchange Agreement Based Asymmetric Dynamics Group
YB Yun, MP Hong, JU Kim, SI Kang
Proceedings of the Korean Information Science Society Conference, 316-319, 2011
2011
Distributed Worm Detection and Prevention Model with Light-Weight Agent
박연희, 김종욱, 이성욱, 김철민, 우즈만, 홍만표
한국정보과학회 학술발표논문집 34 (1A), 114-115, 2007
2007
Hybrid Mix that gives user two reordering method at a time
PS Kang, JU Kim, MP Hong, KS Lhee
Proceedings of the Korean Information Science Society Conference, 146-150, 2007
2007
The method of using various encryption algorithms and key sizes for applying a mix-net to the ubiquitous environment
IH Kim, JU Kim, MP Hong
Proceedings of the Korean Information Science Society Conference, 100-101, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–14