Follow
Dongho Won
Dongho Won
Other names원 동호
Sungkyunkwan University
Verified email at security.re.kr - Homepage
Title
Cited by
Cited by
Year
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
7811997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
3602005
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
Y Choi, D Lee, J Kim, J Jung, J Nam, D Won
Sensors 14 (6), 10081-10106, 2014
2412014
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Advanced Web and Network Technologies, and Applications: APWeb 2006 …, 2006
2112006
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE transactions on Power delivery 24 (3), 1154-1163, 2009
1352009
A practical analysis of smartphone security
W Jeon, J Kim, Y Lee, D Won
Symposium on Human Interface, 311-320, 2011
1282011
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2009
1062009
Security requirements of a mobile device management system
K Rhee, W Jeon, D Won
International Journal of Security and Its Applications 6 (2), 353-358, 2012
932012
Convertible group signatures
SJ Kim, SJ Park, DH Won
Advances in Cryptology—ASIACRYPT'96: International Conference on the Theory …, 1996
921996
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
J Kim, D Lee, W Jeon, Y Lee, D Won
Sensors 14 (4), 6443-6462, 2014
902014
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
892011
An off-line dictionary attack on a simple three-party key exchange protocol
J Nam, J Paik, HK Kang, UM Kim, D Won
IEEE Communications Letters 13 (3), 205-207, 2009
862009
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
842007
ID-based group signature
S Park, S Kim, D Won
Electronics Letters 33 (19), 1616-1616, 1997
801997
A practical study on advanced persistent threats
I Jeun, Y Lee, D Won
Computer Applications for Security, Control and System Engineering …, 2012
742012
Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks
J Jung, J Moon, D Lee, D Won
Sensors 17 (3), 644, 2017
712017
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
J Nam, KKR Choo, S Han, M Kim, J Paik, D Won
Plos one 10 (4), e0116709, 2015
712015
A mobile based anti-phishing authentication scheme using QR code
K Choi, C Lee, W Jeon, K Lee, D Won
International Conference on Mobile IT Convergence, 109-113, 2011
702011
Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction
Y Choi, Y Lee, D Won
International Journal of Distributed Sensor Networks 12 (1), 8572410, 2016
692016
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
H Kim, W Jeon, K Lee, Y Lee, D Won
Computational Science and Its Applications–ICCSA 2012: 12th International …, 2012
692012
The system can't perform the operation now. Try again later.
Articles 1–20