Filter
Conference contribution

Search results

  • 2012

    Anonymity-based authenticated key agreement with full binding property

    Hwang, J. Y., Eom, S., Chang, K. Y., Lee, P. J. & Nyang, D. H., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 177-191 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system

    Kim, J. S., Choi, B. G., Doh, I. & Chung, M. Y., 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 32. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Group key management for secure mobile IPTV service

    Doh, I., Lim, J. & Chung, M. Y., 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 352-357 6 p. 6296878. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2011

    Mistaking friends for foes: An analysis of a social network-based Sybil defense in mobile networks

    Mohaisen, A., AbuHmed, T., Kang, H. J., Kim, Y. & Nyang, D. H., 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 28. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Privacy-enhanced deniable authentication e-mail service

    Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Short group signatures with controllable linkability

    Hwang, J. Y., Lee, S., Chung, B. H., Cho, H. S. & Nyang, D. H., 2011, Proceedings - 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, LightSec 2011. p. 44-52 9 p. 5749558. (Proceedings - 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, LightSec 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • 2010

    Measuring the mixing time of social graphs

    Mohaisen, A., Yun, A. & Kim, Y., 2010, IMC'10 - Proceedings of the 2010 ACM Internet Measurement Conference. Association for Computing Machinery, p. 383-389 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    128 Scopus citations
  • 2009

    A-Kad: An anonymous P2P protocol based on Kad network

    Ni, Y. Q., Nyang, D. H. & Wang, X., 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09. p. 747-752 6 p. 5336924. (2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Anonymous signatures revisited

    Saraswat, V. & Yun, A., 2009, Provable Security - Third International Conference, ProvSec 2009, Proceedings. p. 140-153 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5848 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • On protecting integrity and confidentiality of cryptographic file system for outsourced storage

    Yun, A., Shi, C. & Kim, Y., 2009, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 67-75 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    55 Scopus citations
  • Software-based remote code attestation in wireless sensor network

    AbuHmed, T., Nyamaa, N. & Nyang, D. H., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425280. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Scopus citations
  • 2008

    A key setup and a secure data transmission mechanism based on three-dimensional coordinates for sensor network communication

    Doh, I. & Chae, K., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 121-127 7 p. 4438221. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Data randomization for lightweight secure data aggregation in sensor network

    Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Privacy in location based services: Primitives toward the solution

    Mohaisen, A., Hong, D. & Nyang, D. H., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 572-579 8 p. 4624072. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Protection techniques of secret information in non-tamper proof devices of smart home network

    Mohaisen, A., Maeng, Y., Kang, J., Nyang, D., Lee, K., Hong, D. & Han, J., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 548-562 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    A key management based on multiple regression in hierarchical sensor network

    Kim, M., Doh, I. & Chae, K., 2007, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 267-281 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A simple variant of the Merkle-Damgård Scheme with a permutation

    Hirose, S., Park, J. H. & Yun, A., 2007, Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 113-129 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4833 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    53 Scopus citations
  • Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network

    Kang, J., Nyang, D. H., Mohaisen, A., Choi, Y. G. & Kim, K. S., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 886-899 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4707 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Fair reputation evaluating protocol for mobile ad hoc network

    Lei, Z., Nyang, D. H., Lee, K. H. & Lim, H., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 683-693 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fuzzy face vault: How to implement fuzzy vault with weighted features

    Nyang, D. H. & Lee, K. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 491-496 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On grid-based key pre-distribution: toward a better connectivity in wireless sensor network

    Mohaisen, A., Maeng, Y. J. & Nyang, D. H., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 527-537 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Proactive code verification protocol in wireless sensor network

    Choi, Y. G., Kang, J. & Nyang, D. H., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 1085-1096 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Scopus citations
  • Secret key revocation in sensor networks

    Maeng, Y. J., Mohaisen, A. & Nyang, D. H., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1222-1232 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Structures for communication-efficient public key revocation in ubiquitous sensor network

    Mohaisen, A., Nyang, D. H., Maeng, Y. J. & Lee, K. H., 2007, Mobile Ad-hoc and Sensor Networks - Third International Conference, MSN 2007, Proceedings. Springer Verlag, p. 822-833 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4864 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2006

    Collision search attack for 53-step HAS-160

    Cho, H. S., Park, S., Sung, S. H. & Yun, A., 2006, Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4296 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Cooperative public key authentication protocol in wireless sensor network

    Nyang, D. H. & Mohaisen, A., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 864-873 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Cryptanalysis of the full HAVAL with 4 and 5 passes

    Yu, H., Wang, X., Yun, A. & Park, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 89-110 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Denial-of-Service(DoS) detection through practical entropy estimation on hierarchical sensor networks

    Kim, M., Doh, I. & Chae, K., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 1562-1566 5 p. 1625888. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Fair reputation evaluating protocol for mobile ad hoc network

    Lei, Z., Nyang, D. H., Lee, K. H. & Lim, H., 2006, 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006. IEEE Computer Society, p. 613-616 4 p. 4072161. (2006 International Conference on Computational Intelligence and Security, ICCIAS 2006; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Finding collision on 45-Step HAS-160

    Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks

    Mohaisen, A. & Nyang, D. H., 2006, Wireless Sensor Networks - Third European Workshop, EWSN 2006, Proceedings. p. 83-98 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3868 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Key establishment and authentication mechanism for secure sensor networks

    Doh, I. & Chae, K., 2006, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings. p. 335-344 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3842 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Message and its origin authentication protocol for data aggregation in sensor networks

    Lee, H. K., Nyang, D. H. & Song, J. S., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 281-290 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Pairwise Key establishment mechanism based on clustering for secure sensor network

    Inshil, D., Mihui, K. & Kijoon, C., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 1388-1392 5 p. 1625836. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Pairwise key setup and authentication utilizing deployment information for secure sensor network

    Doh, I., Park, J. M. & Chae, K., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 280-289 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Security enhancement mechanism for Ad-hoc OLSR protocol

    Doh, I., Chae, K., Kim, H. & Chung, K., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 317-326 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2005

    RFID authentication protocol with strong resistance against traceability and denial of service attacks

    Kang, J. & Nyang, D. H., 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. Springer Verlag, p. 164-175 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Selective collision based medium access control protocol for proactive protection of privacy for RFID

    Park, J. S., Kang, J. & Nyang, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 383-392 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Two factor face authentication scheme with cancelable feature

    Kang, J., Nyang, D. H. & Lee, K. H., 2005, Advances in Biometric Person Authentication - International Wokshop on Biometric Recognition Systems, IWBRS 2005, Proceedings. Springer Verlag, p. 67-76 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3781 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2000

    Preventing double-spent coins from revealing user’s whole secret

    Nyang, D. H. & Song, J. S., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 30-37 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 1998

    An interactive proof based identification and signature scheme using Euler's totient function

    Nyang, D. & Song, J., 1998, Proceedings - 1998 IEEE International Symposium on Information Theory, ISIT 1998. p. 82 1 p. 708667. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • An optimized test sequence satisfying the completeness criteria

    Son, H., Nyang, D., Lim, S., Park, J., Choe, Y. H., Chin, B. & Song, J., 1998, Proceedings - 12th International Conference on Information Networking, ICOIN 1998. Institute of Electrical and Electronics Engineers Inc., p. 621-625 5 p. (Proceedings - 12th International Conference on Information Networking, ICOIN 1998).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations