An off-line dictionary attack on a simple three-party key exchange protocol J Nam, J Paik, HK Kang, UM Kim, D Won IEEE Communications Letters 13 (3), 205-207, 2009 | 85 | 2009 |
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation J Nam, KKR Choo, S Han, M Kim, J Paik, D Won Plos one 10 (4), e0116709, 2015 | 73 | 2015 |
Efficient mining of user behaviors by temporal mobile access patterns SC Lee, J Paik, J Ok, I Song, UM Kim Int’l J. Computer Science Security 7 (2), 285-291, 2007 | 72 | 2007 |
A provably-secure ECC-based authentication scheme for wireless sensor networks J Nam, M Kim, J Paik, Y Lee, D Won Sensors 14 (11), 21023-21044, 2014 | 64 | 2014 |
A new method for mining association rules from a collection of XML documents J Paik, HY Youn, U Kim International Conference on Computational Science and Its Applications, 936-945, 2005 | 29 | 2005 |
Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks J Nam, J Paik, UM Kim, D Won IEEE Communications Letters 12 (2), 127-129, 2008 | 28 | 2008 |
A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol J Nam, J Paik, D Won Information Sciences 181 (1), 234-238, 2011 | 26 | 2011 |
Cryptanalysis of a group key transfer protocol based on secret sharing J Nam, M Kim, J Paik, W Jeon, B Lee, D Won Future Generation Information Technology: Third International Conference …, 2011 | 26 | 2011 |
Dictionary attacks against password-based authenticated three-party key exchange protocols J Nam, KKR Choo, M Kim, J Paik, D Won KSII Transactions on Internet and Information Systems (TIIS) 7 (12), 3244-3260, 2013 | 25 | 2013 |
Password‐Only Authenticated Three‐Party Key Exchange with Provable Security in the Standard Model J Nam, KKR Choo, J Kim, HK Kang, J Kim, J Paik, D Won The Scientific World Journal 2014 (1), 825072, 2014 | 21 | 2014 |
Two-round password-only authenticated key exchange in the three-party setting J Nam, KKR Choo, S Han, J Paik, D Won Symmetry 7 (1), 105-124, 2015 | 15 | 2015 |
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks J Nam, J Paik, UM Kim, D Won Information Sciences 177 (23), 5441-5467, 2007 | 14 | 2007 |
Association rule extraction from XML stream data for wireless sensor networks J Paik, J Nam, UM Kim, D Won Sensors 14 (7), 12937-12957, 2014 | 13 | 2014 |
Constant-round authenticated group key exchange with logarithmic computation complexity J Nam, J Paik, UM Kim, D Won Applied Cryptography and Network Security: 5th International Conference …, 2007 | 13 | 2007 |
Survey of distinction of black ice using sensors J Kim, HJ Lee, J Paik Proceedings of the Korean Society of Computer Information Conference, 79-81, 2020 | 10 | 2020 |
Security weaknesses in Harn-Lin and Dutta-Barua protocols for group key establishment JH Nam, MS Kim, JR Paik, DH Won KSII Transactions on Internet and Information Systems (TIIS) 6 (2), 751-765, 2012 | 10 | 2012 |
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. J Paik, J Nam, D Won, UM Kim Journal of Information Science & Engineering 25 (2), 2009 | 10 | 2009 |
Mining association rules from a collection of XML documents using cross filtering algorithm J Shin, J Paik, U Kim 2006 International Conference on Hybrid Information Technology 1, 120-126, 2006 | 10 | 2006 |
Mining maximally common substructures from XML trees with lists-based pattern-growth method J Paik, J Lee, J Nam, UM Kim 2007 International Conference on Computational Intelligence and Security …, 2007 | 9 | 2007 |
EFoX: A scalable method for extracting frequent subtrees J Paik, DR Shin, U Kim International Conference on Computational Science, 813-817, 2005 | 9 | 2005 |