Proxy signatures, revisited S Kim, S Park, D Won International Conference on Information and Communications Security, 223-232, 1997 | 786 | 1997 |
Challenge-response based RFID authentication protocol for distributed database environment K Rhee, J Kwak, S Kim, D Won Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005 | 361 | 2005 |
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography Y Choi, D Lee, J Kim, J Jung, J Nam, D Won Sensors 14 (6), 10081-10106, 2014 | 256 | 2014 |
WIPI mobile platform with secure service for mobile RFID network environment N Park, J Kwak, S Kim, D Won, H Kim Advanced Web and Network Technologies, and Applications: APWeb 2006 …, 2006 | 224 | 2006 |
Advanced key-management architecture for secure SCADA communications D Choi, H Kim, D Won, S Kim IEEE transactions on Power delivery 24 (3), 1154-1163, 2009 | 141 | 2009 |
A practical analysis of smartphone security W Jeon, J Kim, Y Lee, D Won Symposium on Human Interface, 311-320, 2011 | 137 | 2011 |
Efficient secure group communications for SCADA D Choi, S Lee, D Won, S Kim IEEE Transactions on power delivery 25 (2), 714-722, 2009 | 109 | 2009 |
Security requirements of a mobile device management system K Rhee, W Jeon, D Won International Journal of Security and Its Applications 6 (2), 353-358, 2012 | 96 | 2012 |
Convertible group signatures SJ Kim, SJ Park, DH Won Advances in Cryptology—ASIACRYPT'96: International Conference on the Theory …, 1996 | 94 | 1996 |
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks J Kim, D Lee, W Jeon, Y Lee, D Won Sensors 14 (4), 6443-6462, 2014 | 93 | 2014 |
Apparatus and method for inputting graphical password using wheel interface in embedded system D Won, S Park, S Kim US Patent 7,992,202, 2011 | 90 | 2011 |
An off-line dictionary attack on a simple three-party key exchange protocol J Nam, J Paik, HK Kang, UM Kim, D Won IEEE Communications Letters 13 (3), 205-207, 2009 | 85 | 2009 |
Security weakness in a three-party pairing-based protocol for password authenticated key exchange J Nam, Y Lee, S Kim, D Won Information Sciences 177 (6), 1364-1375, 2007 | 85 | 2007 |
A practical study on advanced persistent threats I Jeun, Y Lee, D Won Computer Applications for Security, Control and System Engineering …, 2012 | 83 | 2012 |
ID-based group signature Park, Won Electronics Letters 33 (19), 1616-1617, 1997 | 80 | 1997 |
Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks J Jung, J Moon, D Lee, D Won Sensors 17 (3), 644, 2017 | 78 | 2017 |
A mobile based anti-phishing authentication scheme using QR code K Choi, C Lee, W Jeon, K Lee, D Won International Conference on Mobile IT Convergence, 109-113, 2011 | 78 | 2011 |
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation J Nam, KKR Choo, S Han, M Kim, J Paik, D Won Plos one 10 (4), e0116709, 2015 | 73 | 2015 |
Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction Y Choi, Y Lee, D Won International Journal of Distributed Sensor Networks 12 (1), 8572410, 2016 | 70 | 2016 |
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme H Kim, W Jeon, K Lee, Y Lee, D Won Computational Science and Its Applications–ICCSA 2012: 12th International …, 2012 | 70 | 2012 |