关注
Juryon Paik
Juryon Paik
Pyeongtaek University
在 ptu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
An off-line dictionary attack on a simple three-party key exchange protocol
J Nam, J Paik, HK Kang, UM Kim, D Won
IEEE Communications Letters 13 (3), 205-207, 2009
852009
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
J Nam, KKR Choo, S Han, M Kim, J Paik, D Won
Plos one 10 (4), e0116709, 2015
732015
Efficient mining of user behaviors by temporal mobile access patterns
SC Lee, J Paik, J Ok, I Song, UM Kim
Int’l J. Computer Science Security 7 (2), 285-291, 2007
722007
A provably-secure ECC-based authentication scheme for wireless sensor networks
J Nam, M Kim, J Paik, Y Lee, D Won
Sensors 14 (11), 21023-21044, 2014
642014
A new method for mining association rules from a collection of XML documents
J Paik, HY Youn, U Kim
International Conference on Computational Science and Its Applications, 936-945, 2005
292005
Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks
J Nam, J Paik, UM Kim, D Won
IEEE Communications Letters 12 (2), 127-129, 2008
282008
A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol
J Nam, J Paik, D Won
Information Sciences 181 (1), 234-238, 2011
262011
Cryptanalysis of a group key transfer protocol based on secret sharing
J Nam, M Kim, J Paik, W Jeon, B Lee, D Won
Future Generation Information Technology: Third International Conference …, 2011
262011
Dictionary attacks against password-based authenticated three-party key exchange protocols
J Nam, KKR Choo, M Kim, J Paik, D Won
KSII Transactions on Internet and Information Systems (TIIS) 7 (12), 3244-3260, 2013
252013
Password‐Only Authenticated Three‐Party Key Exchange with Provable Security in the Standard Model
J Nam, KKR Choo, J Kim, HK Kang, J Kim, J Paik, D Won
The Scientific World Journal 2014 (1), 825072, 2014
212014
Two-round password-only authenticated key exchange in the three-party setting
J Nam, KKR Choo, S Han, J Paik, D Won
Symmetry 7 (1), 105-124, 2015
152015
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
J Nam, J Paik, UM Kim, D Won
Information Sciences 177 (23), 5441-5467, 2007
142007
Association rule extraction from XML stream data for wireless sensor networks
J Paik, J Nam, UM Kim, D Won
Sensors 14 (7), 12937-12957, 2014
132014
Constant-round authenticated group key exchange with logarithmic computation complexity
J Nam, J Paik, UM Kim, D Won
Applied Cryptography and Network Security: 5th International Conference …, 2007
132007
Survey of distinction of black ice using sensors
J Kim, HJ Lee, J Paik
Proceedings of the Korean Society of Computer Information Conference, 79-81, 2020
102020
Security weaknesses in Harn-Lin and Dutta-Barua protocols for group key establishment
JH Nam, MS Kim, JR Paik, DH Won
KSII Transactions on Internet and Information Systems (TIIS) 6 (2), 751-765, 2012
102012
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
J Paik, J Nam, D Won, UM Kim
Journal of Information Science & Engineering 25 (2), 2009
102009
Mining association rules from a collection of XML documents using cross filtering algorithm
J Shin, J Paik, U Kim
2006 International Conference on Hybrid Information Technology 1, 120-126, 2006
102006
Mining maximally common substructures from XML trees with lists-based pattern-growth method
J Paik, J Lee, J Nam, UM Kim
2007 International Conference on Computational Intelligence and Security …, 2007
92007
EFoX: A scalable method for extracting frequent subtrees
J Paik, DR Shin, U Kim
International Conference on Computational Science, 813-817, 2005
92005
系统目前无法执行此操作,请稍后再试。
文章 1–20