• 1037 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2002

Virtual software tokens - A practical way to secure PKI roaming

Kwon, T., 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Davida, G., Frankel, Y., Rees, O. & Davida, G. (eds.). Springer Verlag, p. 288-302 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)
2000

A study on the generalized key agreement and password authentication protocol

Kwon, T., 2000, In : IEICE Transactions on Communications. E83-B, 9, p. 2044-2050 7 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
1999

An improvement of the password-based authentication protocol (KIP) on security against replay attacks

Kwon, T., Kang, M., Jung, S. & Song, J., 1999, In : IEICE Transactions on Communications. E82-B, 7, p. 991-997 7 p.

Research output: Contribution to journalArticle

48 Citations (Scopus)

Clarifying straight replays and forced delays

Kwon, T. & Song, J., 1999 Jan, In : Operating Systems Review (ACM). 33, 1, p. 47-52 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Secure agreement scheme for gxy via password authentication

Kwon, T. & Song, J., 1999 May 27, In : Electronics Letters. 35, 11, p. 892-893 2 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)
1998

Authenticated key exchange protocols resistant to password guessing attacks

Kwon, T. & Song, J., 1998, In : IEE Proceedings: Communications. 145, 5, p. 304-308 5 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Efficient and secure password-based authentication protocols against guessing attacks

Kwon, T. & Song, J., 1998 Jul 1, In : Computer Communications. 21, 9, p. 853-861 9 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)
27 Citations (Scopus)
1997

Adaptable and reliable authentication protocol for communication networks

Kwon, T., Kang, M. & Song, J., 1997, In : Proceedings - IEEE INFOCOM. 2, p. 737-744 8 p.

Research output: Contribution to journalConference article

26 Citations (Scopus)

Modeling of security management system for electronic data interchange

Kwon, T., Yoon, M., Kang, J., Song, J. & Kang, C. G., 1997, p. 518-522. 5 p.

Research output: Contribution to conferencePaper

1 Citation (Scopus)
4 Citations (Scopus)
1996

Design of service feature interaction manager in AIN

Song, J., Kang, M., Kwon, T., Yang, C., Hong, S., Kim, T. & Choi, G., 1996, p. 6. 6 p.

Research output: Contribution to conferencePaper