• 1033 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Chapter
2004

Automation-considered logic of authentication and key distribution

Kwon, T. & Lim, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 442-457 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

Research output: Chapter in Book/Report/Conference proceedingChapter

Design and analysis of improved gsm authentication protocol for roaming users

Hahn, G., Kwon, T., Kim, S. & Song, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 451-458 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
3 Citations (Scopus)

Domain-based proxy for efficient location tracking of mobile agents

Song, S. & Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 205-212 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access

Practical authenticated key agreement using passwords

Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Zhang, K. & Zheng, Y. (eds.). Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3225).

Research output: Chapter in Book/Report/Conference proceedingChapter

14 Citations (Scopus)

Reflector attack traceback system with pushback based iTrace mechanism

Lee, H. W., Yun, S. H., Kwon, T., Kim, J. S., Park, H. U. & Oh, N. H., 2004 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 236-248 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)
2003

Practical security improvement of PKCS#5

Song, S., Kwon, T. & Yoon, K. S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 869-876 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

Research output: Chapter in Book/Report/Conference proceedingChapter