Name
Affiliation
Papers
DONGHO WON
Information and Communication Security Lab, School of Information and Communication Engineering, Sungkyunkwan University, Gyeonggi-do, Korea
235
Collaborators
Citations 
PageRank 
192
1262
154.14
Referers 
Referees 
References 
2043
2049
2163
Search Limit
1001000
Title
Citations
PageRank
Year
On a Partially Verifiable Multi-party Multi-argument Zero-knowledge Proof00.342021
A Secure And Lightweight Three-Factor-Based Authentication Scheme For Smart Healthcare Systems00.342020
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.10.392018
Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments00.342018
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks00.342017
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.80.442017
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.00.342017
Software Birthmark Method Using Combined Structure-Based and API-Based.00.342017
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.180.622016
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments10.352016
Api-Based Software Birthmarking Method Using Fuzzy Hashing00.342016
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.20.362016
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.00.342016
Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE)10.372015
Secure Deletion for Flash-Based Self-Encrypting Drives.00.342015
Simple And Provably Secure Anonymous Authenticated Key Exchange With A Binding Property10.362015
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.00.342015
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.10.352015
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System.20.392014
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System.00.342014
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.50.402014
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.30.442013
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol.00.342013
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.00.342013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.30.452013
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity.00.342013
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System.00.342013
Security Requirement of End Point Security Software.00.342013
Threat modeling of a mobile device management system for secure smart work120.772013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed10.412013
An Improvement of Secure Remote User Authentication Scheme Using Smart Cards10.372013
High-Level Design for a Secure Mobile Device Management System.20.402013
An Enhanced Secure Authentication Scheme With Anonymity For Wireless Environments121.212012
On the security of an novel protocol for downloadable CAS00.342012
A Study on Method to Analyze Application on Bada Using GUI without Source Code00.342012
A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques.10.392012
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device10.372012
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment00.342012
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity20.362012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.139.142012
Advanced Information Security Management Evaluation System.71.232011
Security analysis on digital signature function implemented in PDF software00.342011
Malware Variant Detection and Classification Using Control Flow Graph.00.342011
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment41.082011
A practical analysis of smartphone security110.762011
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System00.342011
Server-aided password-authenticated key exchange: from 3-party to group00.342011
Secure Data Deletion for USB Flash Memory.101.012011
Cryptanalysis of a group key transfer protocol based on secret sharing110.922011
A study on the secure home healthcare wireless service00.342011
  • 1
  • 2