Search results

  • 2007

    A key setup mechanism utilizing dual key strings for secure sensor communication

    Doh, I., Kim, M. & Chae, K., 2007, In: International Conference on Advanced Communication Technology, ICACT. 2, p. 1135-1138 4 p., 4195359.

    Research output: Contribution to journalConference articlepeer-review

  • A simple variant of the Merkle-Damgård Scheme with a permutation

    Hirose, S., Park, J. H. & Yun, A., 2007, Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 113-129 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4833 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    58 Scopus citations
  • Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network

    Kang, J., Nyang, D. H., Mohaisen, A., Choi, Y. G. & Kim, K. S., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 886-899 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4707 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Defense mechanism using overlay against DDoS attacks on converged networks

    Kim, M., Doh, I. & Chae, K., 2007, In: International Conference on Advanced Communication Technology, ICACT. 3, p. 1539-1543 5 p., 4195462.

    Research output: Contribution to journalConference articlepeer-review

  • Fair reputation evaluating protocol for mobile ad hoc network

    Lei, Z., Nyang, D. H., Lee, K. H. & Lim, H., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 683-693 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fuzzy face vault: How to implement fuzzy vault with weighted features

    Nyang, D. H. & Lee, K. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 491-496 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On grid-based key pre-distribution: toward a better connectivity in wireless sensor network

    Mohaisen, A., Maeng, Y. J. & Nyang, D. H., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 527-537 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Proactive code verification protocol in wireless sensor network

    Choi, Y. G., Kang, J. & Nyang, D. H., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 1085-1096 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Secret key revocation in sensor networks

    Maeng, Y. J., Mohaisen, A. & Nyang, D. H., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1222-1232 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Smart proactive caching scheme for fast authenticated handoff in wireless LAN

    Kim, S. K., Choi, J. W., Nyang, D. H., Hahn, G. B. & Song, J. S., May 2007, In: Journal of Computer Science and Technology. 22, 3, p. 476-480 5 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Structures for communication-efficient public key revocation in ubiquitous sensor network

    Mohaisen, A., Nyang, D. H., Maeng, Y. J. & Lee, K. H., 2007, Mobile Ad-hoc and Sensor Networks - Third International Conference, MSN 2007, Proceedings. Springer Verlag, p. 822-833 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4864 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2006

    Collision search attack for 53-step HAS-160

    Cho, H. S., Park, S., Sung, S. H. & Yun, A., 2006, Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4296 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Cooperative public key authentication protocol in wireless sensor network

    Nyang, D. H. & Mohaisen, A., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 864-873 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Cryptanalysis of the full HAVAL with 4 and 5 passes

    Yu, H., Wang, X., Yun, A. & Park, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 89-110 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Denial-of-Service(DoS) detection through practical entropy estimation on hierarchical sensor networks

    Kim, M., Doh, I. & Chae, K., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 1562-1566 5 p. 1625888. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Distributed certificate authority under the GRID-location aided routing protocol

    Lim, J. H., Nyang, D. H., Kang, J., Lee, K. H. & Lim, H., 2006, In: Lecture Notes in Computer Science. 3983 LNCS, p. 380-387 8 p.

    Research output: Contribution to journalConference articlepeer-review

  • Fair reputation evaluating protocol for mobile ad hoc network

    Lei, Z., Nyang, D. H., Lee, K. H. & Lim, H., 2006, 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006. IEEE Computer Society, p. 613-616 4 p. 4072161. (2006 International Conference on Computational Intelligence and Security, ICCIAS 2006; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Finding collision on 45-Step HAS-160

    Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks

    Mohaisen, A. & Nyang, D. H., 2006, Wireless Sensor Networks - Third European Workshop, EWSN 2006, Proceedings. p. 83-98 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3868 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Key establishment and authentication mechanism for secure sensor networks

    Doh, I. & Chae, K., 2006, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings. p. 335-344 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3842 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Message and its origin authentication protocol for data aggregation in sensor networks

    Lee, H. K., Nyang, D. H. & Song, J. S., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.-C., Kim, D., Jeong, Y.-S. & Xu, C.-Z. (eds.). Springer Verlag, p. 281-290 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Pairwise Key establishment mechanism based on clustering for secure sensor network

    Inshil, D., Mihui, K. & Kijoon, C., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 1388-1392 5 p. 1625836. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Pairwise key setup and authentication utilizing deployment information for secure sensor network

    Doh, I., Park, J. M. & Chae, K., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 280-289 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Security enhancement mechanism for Ad-hoc OLSR protocol

    Doh, I., Chae, K., Kim, H. & Chung, K., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 317-326 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2005

    RFID authentication protocol with strong resistance against traceability and denial of service attacks

    Kang, J. & Nyang, D. H., 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. Springer Verlag, p. 164-175 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Selective collision based medium access control protocol for proactive protection of privacy for RFID

    Park, J. S., Kang, J. & Nyang, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 383-392 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Two factor face authentication scheme with cancelable feature

    Kang, J., Nyang, D. H. & Lee, K. H., 2005, Advances in Biometric Person Authentication - International Wokshop on Biometric Recognition Systems, IWBRS 2005, Proceedings. Springer Verlag, p. 67-76 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3781 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2004

    Analysis and countermeasure on vulnerability of WPA key exchange mechanism

    Kang, Y. S., Oh, K. H., Chung, B. H., Chung, K. & Nyang, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H.-K. & Goto, S. (eds.). Springer Verlag, p. 915-924 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Scopus citations
  • An efficient video prefix-caching scheme in wide area networks

    Lim, H., Nyang, D. & Du, D. H. C., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H.-K. & Goto, S. (eds.). Springer Verlag, p. 679-688 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Cryptanalysis of a divisor class group based public-key cryptosystem

    Yun, A., Kim, J. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Buell, D. (ed.). Springer Verlag, p. 442-450 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3076).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Secure cluster based routing protocol incorporating the distributed PKI mechanisms

    Hahn, G., Nyang, D., Song, J., Lee, J. I. & Park, B., 2004, p. 787-790. 4 p.

    Research output: Contribution to conferencePaperpeer-review

    7 Scopus citations
  • 2001
  • 2000

    Preventing double-spent coins from revealing user’s whole secret

    Nyang, D. H. & Song, J. S., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 30-37 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 1999

    Complete test sequence using cyclic sequence for conformance testing

    Nyang, D., Lim, S. Y. & Song, J., 25 Sep 1999, In: Computer Communications. 22, 15, p. 1447-1456 10 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Symmetric identity-proving protocol for smart cards

    Nyang, D. H. & Song, J. S., 11 Nov 1999, In: Electronics Letters. 35, 23, p. 2022-2024 3 p.

    Research output: Contribution to journalArticlepeer-review

  • 1998

    An interactive proof based identification and signature scheme using Euler's totient function

    Nyang, D. & Song, J., 1998, Proceedings - 1998 IEEE International Symposium on Information Theory, ISIT 1998. p. 82 1 p. 708667. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • An optimized test sequence satisfying the completeness criteria

    Son, H., Nyang, D., Lim, S., Park, J., Choe, Y. H., Chin, B. & Song, J., 1998, Proceedings - 12th International Conference on Information Networking, ICOIN 1998. Institute of Electrical and Electronics Engineers Inc., p. 621-625 5 p. (Proceedings - 12th International Conference on Information Networking, ICOIN 1998).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Method for hiding information in lattice

    Nyang, D. H. & Song, J. S., 12 Nov 1998, In: Electronics Letters. 34, 23, p. 2226-2228 3 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • 1997

    An interactive identification scheme based on quadratic residue problem

    Nyang, D. H., Kim, E. G. & Song, J. S., 1997, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E80-A, 7, p. 1330-1335 6 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Fast digital signature scheme based on the quadratic residue problem

    Nyang, D. H. & Song, J. S., 30 Jan 1997, In: Electronics Letters. 33, 3, p. 205-206 2 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • Improved location tracking mechanism using call locality relation in personal communications services

    Park, S. J., Nyang, D. H. & Song, J. S., 1997, p. 30-34. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  • Locality based location tracking using virtually hierarchical link in personal communications services

    Park, S. J., Lee, D. C., Yang, C. Y., Nyang, D. H. & Song, J. S., 1997, p. 190-193. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  • New sequence number for aal 3/4 in atm networks

    Lim, H., Nyang, D. & Song, J., 1997, In: IEICE Transactions on Communications. E80-B, 2, p. 379-380 2 p.

    Research output: Contribution to journalArticlepeer-review

  • Test sequence generation scheme satisfying the completeness criteria

    Son, H. S., Nyang, D. H., Park, J. H., Lim, S. Y., Chin, B. M., Lee, J. W. & Song, J. S., 1997, p. 560-563. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  • 1996

    Improving the performance of cell-loss recovery in ATM networks

    Lim, H. T., Nyang, D. H. & Song, J. S., 1996, In: Electronics Letters. 32, 17, p. XIII-XIV

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Improving the performance of cell-loss recovery in ATM networks

    Lim, H. T., Nyang, D. H. & Song, J. S., 1 Jan 1996, In: Electronics Letters. 32, 17, p. 1540-1542 3 p.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations