• 1037 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

1996

Design of service feature interaction manager in AIN

Song, J., Kang, M., Kwon, T., Yang, C., Hong, S., Kim, T. & Choi, G., 1996, p. 6. 6 p.

Research output: Contribution to conferencePaper

1997

Adaptable and reliable authentication protocol for communication networks

Kwon, T., Kang, M. & Song, J., 1997, In : Proceedings - IEEE INFOCOM. 2, p. 737-744 8 p.

Research output: Contribution to journalConference article

26 Citations (Scopus)

Modeling of security management system for electronic data interchange

Kwon, T., Yoon, M., Kang, J., Song, J. & Kang, C. G., 1997, p. 518-522. 5 p.

Research output: Contribution to conferencePaper

1 Citation (Scopus)
4 Citations (Scopus)
1998

Authenticated key exchange protocols resistant to password guessing attacks

Kwon, T. & Song, J., 1998, In : IEE Proceedings: Communications. 145, 5, p. 304-308 5 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Efficient and secure password-based authentication protocols against guessing attacks

Kwon, T. & Song, J., 1998 Jul 1, In : Computer Communications. 21, 9, p. 853-861 9 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)
27 Citations (Scopus)
1999

An improvement of the password-based authentication protocol (KIP) on security against replay attacks

Kwon, T., Kang, M., Jung, S. & Song, J., 1999, In : IEICE Transactions on Communications. E82-B, 7, p. 991-997 7 p.

Research output: Contribution to journalArticle

48 Citations (Scopus)

Clarifying straight replays and forced delays

Kwon, T. & Song, J., 1999 Jan, In : Operating Systems Review (ACM). 33, 1, p. 47-52 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Secure agreement scheme for gxy via password authentication

Kwon, T. & Song, J., 1999 May 27, In : Electronics Letters. 35, 11, p. 892-893 2 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)
2000

A study on the generalized key agreement and password authentication protocol

Kwon, T., 2000, In : IEICE Transactions on Communications. E83-B, 9, p. 2044-2050 7 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2002

Digital signature algorithm for securing digital identities

Kwon, T., 2002 Jun 15, In : Information Processing Letters. 82, 5, p. 247-252 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Hybrid networked cryptographic devices in practice

Kwon, T., Lee, S. Y., Choi, Y. S. & Kim, H., 2002 Sep, In : IEICE Transactions on Communications. E85-B, 9, p. 1832-1834 3 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Impersonation attacks on software-only two-factor authentication schemes

Kwon, T., 2002 Aug, In : IEEE Communications Letters. 6, 8, p. 358-360 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

On the difficulty of protecting private keys in software

Kwon, T., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Shape-sequence-based key image generation algorithm for browsing and retrieval of video clips

Lee, S., Choi, Y. S., Lim, W., Kwon, T. K. & Kim, H. K., 2002 Jun 6, In : Electronics Letters. 38, 12, p. 549-550 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Virtual software tokens - A practical way to secure PKI roaming

Kwon, T., 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Davida, G., Frankel, Y., Rees, O. & Davida, G. (eds.). Springer Verlag, p. 288-302 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)
2003

A model for embedding and authorizing digital signatures in printed documents

Lee, J. I., Kwon, T., Song, S. & Song, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lim, C. H. (eds.). Springer Verlag, p. 465-477 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2587).

Research output: Chapter in Book/Report/Conference proceedingChapter

Practical security improvement of PKCS#5

Song, S., Kwon, T. & Yoon, K. S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 869-876 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)
2004

Automation-considered logic of authentication and key distribution

Kwon, T. & Lim, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 442-457 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

Research output: Chapter in Book/Report/Conference proceedingChapter

Design and analysis of improved gsm authentication protocol for roaming users

Hahn, G., Kwon, T., Kim, S. & Song, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 451-458 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
3 Citations (Scopus)

Domain-based proxy for efficient location tracking of mobile agents

Song, S. & Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 205-212 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access

Practical authenticated key agreement using passwords

Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Zhang, K. & Zheng, Y. (eds.). Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3225).

Research output: Chapter in Book/Report/Conference proceedingChapter

14 Citations (Scopus)
12 Citations (Scopus)

Refinement and Improvement of Virtual Software Token Protocols

Kwon, T., 2004 Jan, In : IEEE Communications Letters. 8, 1, p. 75-77 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Reflector attack traceback system with pushback based iTrace mechanism

Lee, H. W., Yun, S. H., Kwon, T., Kim, J. S., Park, H. U. & Oh, N. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 236-248 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)
2005

An authentication scheme based upon face recognition for the mobile environment

Kim, Y. G. & Kwon, T., 2005, Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Zhang, J., He, J-H. & Fu, Y. (eds.). Springer Verlag, p. 274-279 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3314 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient message broadcast authentication scheme for sensor networks

Park, S. H. & Kwon, T., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 427-432 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated key agreement without subgroup element verification

Kwon, T., 2005, In : Lecture Notes in Computer Science. 3480, I, p. 577-583 7 p.

Research output: Contribution to journalConference article

Efficient key agreement for merging clusters in ad-hoc networking environments

Shin, S. & Kwon, T., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 996-1005 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Multi-modal biometrics with PKIs for border control applications

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3480, I, p. 584-590 7 p.

Research output: Contribution to journalConference article

Multi-modal biometrics with PKI technologies for border control applications

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3495, p. 99-114 16 p.

Research output: Contribution to journalConference article

7 Citations (Scopus)

Multi-modal techniques for identity theft prevention

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3597, p. 291-300 10 p.

Research output: Contribution to journalConference article

NS-2 based IP traceback simulation against reflector based DDoS attack

Lee, H. W., Kwon, T. & Kim, H. J., 2005, In : Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3397, p. 90-99 10 p.

Research output: Contribution to journalConference article

5 Citations (Scopus)

Security analysis and improvement of the efficient password-based authentication protocol

Kwon, T., Park, Y. H. & Lee, H. J., 2005 Jan, In : IEEE Communications Letters. 9, 1, p. 93-95 3 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Strengthening password-based authentication protocols against online dictionary attacks

Wang, P., Kim, Y., Kher, V. & Kwon, T., 2005, In : Lecture Notes in Computer Science. 3531, p. 17-32 16 p.

Research output: Contribution to journalConference article

4 Citations (Scopus)
2006

An improved fingerprint-based remote user authentication scheme using smart cards

Lee, Y. & Kwon, T., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 915-922 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Cluster-based certificate chain for mobile ad hoc networks

Hahn, G., Kwon, T., Kim, S. & Song, J., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 769-778 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Content distribution system based on MPEG-4 ISMACryp in set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006, 2006 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE '06. p. 235-236 2 p. 1598397. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006 May, In : IEEE Transactions on Consumer Electronics. 52, 2, p. 660-668 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Efficient linear array for multiplication over NIST recommended binary fields

Kwon, S., Kwon, T. & Park, Y. H., 2006, Fuzzy Logic and Applications - 6th International Workshop, WILF 2005, Revised Selected Papers. p. 427-436 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3849 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experimental study on wireless sensor network security

Kwon, T. & Park, S. H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 741-743 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Location-aware key management using multi-layer grids for wireless sensor networks

Lee, J. H., Kwon, T. & Song, J., 2006, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 390-404 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)

New architecture for multiplication in GF(2m) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography

Kwon, S., Kwon, T. & Park, Y. H., 2006 Jan 1, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 335-351 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Partial key exposure attacks on unbalanced RSA with the CRT

Lee, H. J., Park, Y. H. & Kwon, T., 2006, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A, 2, p. 626-629 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security analysis of secure password authentication for keystroke dynamics

Song, H. & Kwon, T., 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 916-923 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4251 LNAI - I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution