Follow
Junghyun Nam
Junghyun Nam
Professor of Computer Engineering, Konkuk University
Verified email at kku.ac.kr - Homepage
Title
Cited by
Cited by
Year
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
Y Choi, D Lee, J Kim, J Jung, J Nam, D Won
Sensors 14 (6), 10081-10106, 2014
2412014
An off-line dictionary attack on a simple three-party key exchange protocol
J Nam, J Paik, HK Kang, UM Kim, D Won
IEEE Communications Letters 13 (3), 205-207, 2009
862009
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
842007
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
J Nam, KKR Choo, S Han, M Kim, J Paik, D Won
Plos one 10 (4), e0116709, 2015
712015
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
682005
A provably-secure ECC-based authentication scheme for wireless sensor networks
J Nam, M Kim, J Paik, Y Lee, D Won
Sensors 14 (11), 21023-21044, 2014
612014
Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics
Y Choi, J Nam, D Lee, J Kim, J Jung, D Won
The Scientific World Journal 2014, 2014
602014
A weakness in the Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme for low-power mobile devices
J Nam, S Kim, D Won
IEEE Communications Letters 9 (5), 429-431, 2005
442005
Security analysis of a nonce-based user authentication scheme using smart cards
NAM Junghyun, KIM Seungjoo, P Sangjoon, WON Dongho
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2007
352007
Simple and efficient group key agreement based on factoring
J Nam, S Cho, S Kim, D Won
Computational Science and Its Applications–ICCSA 2004: International …, 2004
342004
A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols
KKR Choo, J Nam, D Won
Information Sciences 281, 182-200, 2014
332014
Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks
J Nam, J Paik, UM Kim, D Won
IEEE Communications Letters 12 (2), 127-129, 2008
272008
An enhanced secure authentication scheme with anonymity for wireless environments
J Woongryul, K Jeeyeon, N Junghyun, L Youngsook, W Dongho
IEICE transactions on communications 95 (7), 2505-2508, 2012
262012
Cryptanalysis of a group key transfer protocol based on secret sharing
J Nam, M Kim, J Paik, W Jeon, B Lee, D Won
Future Generation Information Technology: Third International Conference …, 2011
262011
Dictionary attacks against password-based authenticated three-party key exchange protocols
J Nam, KKR Choo, M Kim, J Paik, D Won
KSII Transactions on Internet and Information Systems (TIIS) 7 (12), 3244-3260, 2013
252013
Secure group communications over combined wired and wireless networks
J Nam, S Kim, D Won
International Conference on Trust, Privacy and Security in Digital Business …, 2005
252005
A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol
J Nam, J Paik, D Won
Information Sciences 181 (1), 234-238, 2011
242011
Efficient password-authenticated key exchange based on RSA
S Park, J Nam, S Kim, D Won
Cryptographers’ Track at the RSA Conference, 309-323, 2007
242007
An efficient dynamic group key agreement for low-power mobile devices
S Cho, J Nam, S Kim, D Won
Computational Science and Its Applications–ICCSA 2005: International …, 2005
202005
Attacks on Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
J Nam, S Kim, D Won
Cryptology ePrint Archive, 2004
202004
The system can't perform the operation now. Try again later.
Articles 1–20