Dongho Won

From MaRDI portal
(Redirected from Person:507653)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Two-round password-only authenticated key exchange in the three-party setting
Symmetry
2017-09-27Paper
Prevention of exponential equivalence in simple password exponential key exchange (SPEKE)
Symmetry
2017-09-27Paper
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Information Sciences
2017-02-07Paper
Security improvement on a group key exchange protocol for mobile networks
Computational Science and Its Applications - ICCSA 2011
2011-06-30Paper
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
Information Sciences
2011-01-28Paper
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
2010-04-07Paper
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
Applied Cryptography and Network Security
2009-03-10Paper
Two Efficient and Secure Authentication Schemes Using Smart Cards
Computational Science and Its Applications - ICCSA 2006
2009-02-12Paper
An Inter-domain Key Agreement Protocol Using Weak Passwords
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Efficient Password-Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science
2008-04-17Paper
Threshold Entrusted Undeniable Signature
Lecture Notes in Computer Science
2008-03-17Paper
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
Information Sciences
2007-10-18Paper
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences
2007-02-20Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2005-12-23Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2005-12-23Paper
Computational Science – ICCS 2005
Lecture Notes in Computer Science
2005-11-30Paper
scientific article; zbMATH DE number 2048536 (Why is no real title available?)
 
2004-03-01Paper
scientific article; zbMATH DE number 2013390 (Why is no real title available?)
 
2003-12-04Paper
scientific article; zbMATH DE number 1759336 (Why is no real title available?)
 
2003-01-25Paper
scientific article; zbMATH DE number 1759645 (Why is no real title available?)
 
2002-11-24Paper
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
Cryptography and Coding
2002-11-12Paper
On proposition and comparison of trace computation methods in finite field \(GF(2^m)\)
Far East Journal of Mathematical Sciences
2002-05-04Paper
scientific article; zbMATH DE number 1689607 (Why is no real title available?)
 
2002-01-13Paper
scientific article; zbMATH DE number 1805963 (Why is no real title available?)
 
2002-01-01Paper
scientific article; zbMATH DE number 1304301 (Why is no real title available?)
 
2000-02-15Paper
scientific article; zbMATH DE number 1107690 (Why is no real title available?)
 
1998-06-09Paper
scientific article; zbMATH DE number 1107689 (Why is no real title available?)
 
1998-05-03Paper


Research outcomes over time


This page was built for person: Dongho Won