• 1033 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference article
2005

Authenticated key agreement without subgroup element verification

Kwon, T., 2005 Sep 26, In : Lecture Notes in Computer Science. 3480, I, p. 577-583 7 p.

Research output: Contribution to journalConference article

Multi-modal biometrics with PKIs for border control applications

Kwon, T. & Moon, H., 2005 Sep 26, In : Lecture Notes in Computer Science. 3480, I, p. 584-590 7 p.

Research output: Contribution to journalConference article

Multi-modal biometrics with PKI technologies for border control applications

Kwon, T. & Moon, H., 2005, In : Lecture Notes in Computer Science. 3495, p. 99-114 16 p.

Research output: Contribution to journalConference article

7 Citations (Scopus)

Multi-modal techniques for identity theft prevention

Kwon, T. & Moon, H., 2005 Oct 19, In : Lecture Notes in Computer Science. 3597, p. 291-300 10 p.

Research output: Contribution to journalConference article

NS-2 based IP traceback simulation against reflector based DDoS attack

Lee, H. W., Kwon, T. & Kim, H. J., 2005 Oct 24, In : Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3397, p. 90-99 10 p.

Research output: Contribution to journalConference article

5 Citations (Scopus)

Strengthening password-based authentication protocols against online dictionary attacks

Wang, P., Kim, Y., Kher, V. & Kwon, T., 2005 Jan 1, In : Lecture Notes in Computer Science. 3531, p. 17-32 16 p.

Research output: Contribution to journalConference article

4 Citations (Scopus)
2003
2 Citations (Scopus)
1997

Adaptable and reliable authentication protocol for communication networks

Kwon, T., Kang, M. & Song, J., 1997 Dec 1, In : Proceedings - IEEE INFOCOM. 2, p. 737-744 8 p.

Research output: Contribution to journalConference article

26 Citations (Scopus)

Security and efficiency in authentication protocols resistant to password guessing attacks

Kwon, T. & Song, J., 1997 Dec 1, In : Conference on Local Computer Networks. p. 245-252 8 p.

Research output: Contribution to journalConference article

4 Citations (Scopus)
1996