• 1037 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2008
2007

A practical method for generating digital signatures using biometrics

Kwon, T., Lee, H. W. & Lee, J. I., 2007 Jun, In : IEICE Transactions on Communications. E90-B, 6, p. 1381-1389 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A time-based key management protocol for wireless sensor networks

Jang, J., Kwon, T. & Song, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Biometric digital key mechanisms for telebiometric authentication based on biometric certificate

Lee, H. W. & Kwon, T., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 428-437 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Biometric person authentication for access control scenario based on face recognition

Moon, H. & Kwon, T., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 463-472 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Deriving the virtual world from wireless sensor networks for interaction with consumer electronic devices

Kwon, T. & Choi, S. M., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146240. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Efficient and secure key agreement for merging clusters in Ad-Hoc networking environments

Shin, S. & Kwon, T., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1575-1583 9 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Knowledge-based user authentication associated with biometrics

Kwon, T. & Moon, H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 414-419 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Multi-modal authentication for ubiquitous computing environments

Kwon, T., Park, S. H. & Shin, S., 2007, Universal Access in Human-Computer Interaction: Ambient Interaction - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4555 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy protection in PKIs: A separation-of-authority approach

Kwon, T., Cheon, J. H., Kim, Y. & Lee, J. I., 2007, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 297-311 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Secure dynamic network reprogramming using supplementary hash in wireless sensor networks

Park, K., Lee, J. H., Kwon, T. & Song, J., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 653-662 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Three-party password authenticated key agreement resistant to server compromise

Kwon, T. & Lee, D. H., 2007, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 312-323 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2006

An improved fingerprint-based remote user authentication scheme using smart cards

Lee, Y. & Kwon, T., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 915-922 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Cluster-based certificate chain for mobile ad hoc networks

Hahn, G., Kwon, T., Kim, S. & Song, J., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 769-778 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Content distribution system based on MPEG-4 ISMACryp in set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006, 2006 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE '06. p. 235-236 2 p. 1598397. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006 May, In : IEEE Transactions on Consumer Electronics. 52, 2, p. 660-668 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Efficient linear array for multiplication over NIST recommended binary fields

Kwon, S., Kwon, T. & Park, Y. H., 2006, Fuzzy Logic and Applications - 6th International Workshop, WILF 2005, Revised Selected Papers. p. 427-436 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3849 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experimental study on wireless sensor network security

Kwon, T. & Park, S. H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 741-743 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Location-aware key management using multi-layer grids for wireless sensor networks

Lee, J. H., Kwon, T. & Song, J., 2006, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 390-404 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)

New architecture for multiplication in GF(2m) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography

Kwon, S., Kwon, T. & Park, Y. H., 2006 Jan 1, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 335-351 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Partial key exposure attacks on unbalanced RSA with the CRT

Lee, H. J., Park, Y. H. & Kwon, T., 2006, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A, 2, p. 626-629 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security analysis of secure password authentication for keystroke dynamics

Song, H. & Kwon, T., 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 916-923 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4251 LNAI - I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Strong and robust RFID authentication enabling perfect ownership transfer

Lim, C. H. & Kwon, T., 2006, Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings. Ning, P., Qing, S. & Li, N. (eds.). Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4307 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

118 Citations (Scopus)
2005

An authentication scheme based upon face recognition for the mobile environment

Kim, Y. G. & Kwon, T., 2005, Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Zhang, J., He, J-H. & Fu, Y. (eds.). Springer Verlag, p. 274-279 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3314 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient message broadcast authentication scheme for sensor networks

Park, S. H. & Kwon, T., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 427-432 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated key agreement without subgroup element verification

Kwon, T., 2005, In : Lecture Notes in Computer Science. 3480, I, p. 577-583 7 p.

Research output: Contribution to journalConference article

Efficient key agreement for merging clusters in ad-hoc networking environments

Shin, S. & Kwon, T., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 996-1005 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Multi-modal biometrics with PKIs for border control applications

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3480, I, p. 584-590 7 p.

Research output: Contribution to journalConference article

Multi-modal biometrics with PKI technologies for border control applications

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3495, p. 99-114 16 p.

Research output: Contribution to journalConference article

7 Citations (Scopus)

Multi-modal techniques for identity theft prevention

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3597, p. 291-300 10 p.

Research output: Contribution to journalConference article

NS-2 based IP traceback simulation against reflector based DDoS attack

Lee, H. W., Kwon, T. & Kim, H. J., 2005, In : Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3397, p. 90-99 10 p.

Research output: Contribution to journalConference article

5 Citations (Scopus)

Security analysis and improvement of the efficient password-based authentication protocol

Kwon, T., Park, Y. H. & Lee, H. J., 2005 Jan, In : IEEE Communications Letters. 9, 1, p. 93-95 3 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Strengthening password-based authentication protocols against online dictionary attacks

Wang, P., Kim, Y., Kher, V. & Kwon, T., 2005, In : Lecture Notes in Computer Science. 3531, p. 17-32 16 p.

Research output: Contribution to journalConference article

4 Citations (Scopus)
2004

Automation-considered logic of authentication and key distribution

Kwon, T. & Lim, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 442-457 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

Research output: Chapter in Book/Report/Conference proceedingChapter

Design and analysis of improved gsm authentication protocol for roaming users

Hahn, G., Kwon, T., Kim, S. & Song, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 451-458 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
3 Citations (Scopus)

Domain-based proxy for efficient location tracking of mobile agents

Song, S. & Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 205-212 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access

Practical authenticated key agreement using passwords

Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Zhang, K. & Zheng, Y. (eds.). Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3225).

Research output: Chapter in Book/Report/Conference proceedingChapter

14 Citations (Scopus)
12 Citations (Scopus)

Refinement and Improvement of Virtual Software Token Protocols

Kwon, T., 2004 Jan, In : IEEE Communications Letters. 8, 1, p. 75-77 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Reflector attack traceback system with pushback based iTrace mechanism

Lee, H. W., Yun, S. H., Kwon, T., Kim, J. S., Park, H. U. & Oh, N. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 236-248 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)
2003

A model for embedding and authorizing digital signatures in printed documents

Lee, J. I., Kwon, T., Song, S. & Song, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lim, C. H. (eds.). Springer Verlag, p. 465-477 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2587).

Research output: Chapter in Book/Report/Conference proceedingChapter

Practical security improvement of PKCS#5

Song, S., Kwon, T. & Yoon, K. S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 869-876 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)
2002

Digital signature algorithm for securing digital identities

Kwon, T., 2002 Jun 15, In : Information Processing Letters. 82, 5, p. 247-252 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Hybrid networked cryptographic devices in practice

Kwon, T., Lee, S. Y., Choi, Y. S. & Kim, H., 2002 Sep, In : IEICE Transactions on Communications. E85-B, 9, p. 1832-1834 3 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Impersonation attacks on software-only two-factor authentication schemes

Kwon, T., 2002 Aug, In : IEEE Communications Letters. 6, 8, p. 358-360 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

On the difficulty of protecting private keys in software

Kwon, T., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Shape-sequence-based key image generation algorithm for browsing and retrieval of video clips

Lee, S., Choi, Y. S., Lim, W., Kwon, T. K. & Kim, H. K., 2002 Jun 6, In : Electronics Letters. 38, 12, p. 549-550 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)