Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Ahmad Zubaidi Abdul Latif
Tidjani Négadi
Ebone Cutts
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Aled M. Edwards
Home
/
Author
/
DONGHO WON
Author Info
Open Visualization
Name
Affiliation
Papers
DONGHO WON
Information and Communication Security Lab, School of Information and Communication Engineering, Sungkyunkwan University, Gyeonggi-do, Korea
235
Collaborators
Citations
PageRank
192
1262
154.14
Referers
Referees
References
2043
2049
2163
Search Limit
100
1000
Publications (100 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
On a Partially Verifiable Multi-party Multi-argument Zero-knowledge Proof
0
0.34
2021
A Secure And Lightweight Three-Factor-Based Authentication Scheme For Smart Healthcare Systems
0
0.34
2020
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.
1
0.39
2018
Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments
0
0.34
2018
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks
0
0.34
2017
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
8
0.44
2017
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.
0
0.34
2017
Software Birthmark Method Using Combined Structure-Based and API-Based.
0
0.34
2017
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
18
0.62
2016
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments
1
0.35
2016
Api-Based Software Birthmarking Method Using Fuzzy Hashing
0
0.34
2016
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
2
0.36
2016
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
0
0.34
2016
Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE)
1
0.37
2015
Secure Deletion for Flash-Based Self-Encrypting Drives.
0
0.34
2015
Simple And Provably Secure Anonymous Authenticated Key Exchange With A Binding Property
1
0.36
2015
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
0
0.34
2015
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.
1
0.35
2015
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System.
2
0.39
2014
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System.
0
0.34
2014
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
5
0.40
2014
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
3
0.44
2013
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol.
0
0.34
2013
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
0
0.34
2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
3
0.45
2013
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity.
0
0.34
2013
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System.
0
0.34
2013
Security Requirement of End Point Security Software.
0
0.34
2013
Threat modeling of a mobile device management system for secure smart work
12
0.77
2013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed
1
0.41
2013
An Improvement of Secure Remote User Authentication Scheme Using Smart Cards
1
0.37
2013
High-Level Design for a Secure Mobile Device Management System.
2
0.40
2013
An Enhanced Secure Authentication Scheme With Anonymity For Wireless Environments
12
1.21
2012
On the security of an novel protocol for downloadable CAS
0
0.34
2012
A Study on Method to Analyze Application on Bada Using GUI without Source Code
0
0.34
2012
A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques.
1
0.39
2012
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device
1
0.37
2012
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment
0
0.34
2012
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity
2
0.36
2012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
13
9.14
2012
Advanced Information Security Management Evaluation System.
7
1.23
2011
Security analysis on digital signature function implemented in PDF software
0
0.34
2011
Malware Variant Detection and Classification Using Control Flow Graph.
0
0.34
2011
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment
4
1.08
2011
A practical analysis of smartphone security
11
0.76
2011
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System
0
0.34
2011
Server-aided password-authenticated key exchange: from 3-party to group
0
0.34
2011
Secure Data Deletion for USB Flash Memory.
10
1.01
2011
Cryptanalysis of a group key transfer protocol based on secret sharing
11
0.92
2011
A study on the secure home healthcare wireless service
0
0.34
2011
1
2
50 / page