PUBLICATION


I have written 8 books, 71 SCI(E) papers, 29 patents, and according to Google Scholar, the citations to my works are 3400+. My ultimate research objective is Security Engineering for High-Assurance Trustworthy(or Dependable) Cyber-Physical Systems. Especially, I focus on Security Engineering & Security Development Lifecycle including (1) Threat-Risk Modeling, (2) Provably Secure Design, (3) Automated Verification of Security Implementations, (4) Penetration Testing, (5) Secure Over-The-Air Software Updates, and (6) Security Evaluation & Certification (including CMVP, CC, C&A, SSE-CMM).


Books

  1. [B] (Translated by) Seungjoo Kim et al., "Cryptography & Network Security - Principles and Practice - (Written by W. Stallings / Published by Pearson)", Greenpress, March 11, 2011.
  2. [B] Seungjoo Kim et al., "유비쿼터스 지식능력검정", Youngjin Media, May 30, 2008.
  3. [B] (Translated by) Seungjoo Kim and Dongho Won, "Using the Common Criteria for IT Security Evaluation (Written by Debra S. Herrmaun / Published by CRC Press)", HONGREUNG Science, March 5, 2008.
  4. [B] Dongho Won and Seungjoo Kim (Ed.), "Information Security and Cryptology - ICISC 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005. Proceedings", Springer-Verlag, LNCS 3935, 2006. pp.1-455.
  5. [B] (Translated by) Heung Youl Youm, Seungjoo Kim, Jihong Kim, and Gwangsoo Rhee, "Security in Computing - 3/e (Written by C.P. Pfleeger and S.L. Pfleeger / Published by Prentica Hall)", HONGREUNG Science, November 5, 2005.
  6. [B] (Translated by) J.W.Chung, Hee Yong Youn, Hyunseung Choo, Jee-Hyong Lee, and Seungjoo Kim, "Computers - Tools for an Information Age - 8/e (Written by H.L. Capron and J.A. Johnson / Published by Prentica Hall)", HONGREUNG Science, February 28, 2005.
  7. [B] (Translated by) Seungjoo Kim, Heung-Youl Youm, Chong-Ho Yoon, Yong-Hee Jeon, Taenam Cho, and Jinwan Park, "first-step Network Security (Written by Tom Thomas / Published by Cisco Systems)", Kyohaksa, January 3, 2005.
  8. [B] Taekyoung Kwon, Myungho Kang, Seungjoo Kim, Jungwook Seo, and Seunghun Jin, "정보보호 표준개론", TTA (Telecommunications Technology Association), November 1, 2002.


Threat-Risk Modeling, Security Verification & Security Evaluation

  1. [IJ] Sooyoung Kang and Seungjoo Kim, "How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability", Symmetry-Basel, MDPI, October 2017, Volume 9, Issue 10, pp 1–12. (SCI-E, SCOPUS, IF:1.457)
  2. [IJ] Jong Han Lee and Seungjoo Kim, "Analysis and Security Evaluation of Security Threats on Broadcasting Service", Wireless Personal Communications, Springer, August 2017, Volume 95, Issue 4, pp 4149–4169. (SCI-E, SCOPUS, IF:0.701)
  3. [IJ] Kyumin Cho, Hyunwoo Lim, Taeshik Shon, and Seungjoo Kim, "A Novel Security Architecture for Smart Grid Communication", The Journal of Supercomputing, Springer, January 2016, Volume 72, Issue 1, pp 214–231. (SCI, SCOPUS, IF:0.841)
  4. [IJ] Sangsik Lee, Donghyun Choi, Dongho Won and Seungjoo Kim, "Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea", Journal of Software, Vol.8, No.3, March 2013, pp.520-527. (SCOPUS)
  5. [IJ] Heasuk Jo, Seungjoo Kim, and Dongho Won, "Advanced Information Security Management Evaluation System", KSII Transactions on Internet and Information Systems, Vol.5, No.6, June 2011, pp.1192-1213. (SCI-E, SCOPUS, IF:0.164)

  6. [IC] JongHo Lee, MinGeun Kim, and Seungjoo Kim, "Are you watching TV now? Is it real?: Hacking of smart TV with 0-day", Hack in Paris 2017, Disney's Newport Bay Club Convention Center, Paris, France, June 19-23, 2017. (Note : Watch also this video)
  7. [IC] In Hyuk Seo, Jinhyun Yu, Ki-Taek Lee, and Seungjoo Kim, "[Poster] Deep Learning Based Real-Time DNS DDoS Detection System", ACSAC 2016, The 32nd Annual Computer Security Applications Conference, Los Angeles, California, USA, December 5-9, 2016.
  8. [IC] In Hyuk Seo, Jisoo Park, and Seungjoo Kim, "Using the CGC's Fully Automated Vulnerability Detection Tools in Security Evaluation and Its Effectiveness - Are Tools Good for Hackers Good for Security Evaluators? -", CODE BLUE 2016, Tokyo, Japan, October 20-21, 2016. (Note : Watch also this video)
  9. [IC] Ki-Taek Lee, Seungsoo Baek, and Seungjoo Kim, "[Case Study] DDoS Attack to DNS Using Infected IoT Devices", ACSAC 2015, The 31st Annual Computer Security Applications Conference, Los Angeles, California, USA, December 7-11, 2015
  10. [IC] Jaeki Kim, Junghoon Shin, and Seungjoo Kim, "Welcome to Mobile Connected World!!", The 5th SECUINSIDE 2015, Seoul, Korea, July 16-17, 2015. (Note : Here, we discovered some critical vulnerabilities in LTE Femtocell and notified to the operator and manufacturer. Watch also this video.)
  11. [IC] Heekyeong Noh, Changguk Choi, Minsu Park, Jaeki Kim, and Seungjoo Kim, "Security Analysis on Password Authentication System of Web Portal", Proc. of The 6th WiMoNe 2014, The 6th International Conference on Wireless & Mobile Networks, Sydney, Australia, December 27-28, 2014, pp.71-92.
  12. [IC] Sunghwan Kim, Heekyeong Noh, Chunghan Kim, and Seungjoo Kim, "Study on Analysis of Commercial Mobile Keypad Schemes and Modeling of Shoulder Surfing Attack", Proc. of The 6th WiMoNe 2014, The 6th International Conference on Wireless & Mobile Networks, Sydney, Australia, December 27-28, 2014, pp.93-112.
  13. [IC] Minsu Park, Heesoo Kang, Jaeki Kim, Seungjin Lee, and Seungjoo Kim, "Developing a Protection Profile for Smart TV", Proc. of The 15th ICCC 2014, The 14th International Common Criteria Conference, New Delhi, India, September 9-11, 2014.
  14. [IC] Jinseok Park and Seungjoo Kim, "How the CC Harmonizes with Secure Software Development Lifecycle", Proc. of The 14th ICCC 2013, The 14th International Common Criteria Conference, Orlando, Florida, USA, September 10-12, 2013.
  15. [IC] Jeonghoon Han and Seungjoo Kim, "Problem and Improvement of the Composition Documents for Smart Card Composite Product Evaluations",Proc. of The 14th ICCC 2013, The 14th International Common Criteria Conference, Orlando, Florida, USA, September 10-12, 2013.
  16. [IC] SeungJin (beist) Lee and Seungjoo Kim, (Invited Paper) "Hacking, Surveilling, and Deceiving Victims on Smart TV", EDSC 2013, Embedded Device Security Conference 2013, Seattle, WA, USA, August 14 - 15, 2013.
  17. [IC] SeungJin (beist) Lee and Seungjoo Kim, "Hacking, Surveilling, and Deceiving Victims on Smart TV", The 17th Black Hat USA 2013, Las Vegas, Nevada, USA, July 27 - Aug 1, 2013. (Note : Watch also this video and script)
  18. [IC] SeungJin (beist) Lee and Seungjoo Kim, (Invited Paper) "Smart TV Security - #1984 in 21st century -", TROOPERS 2013, Heidelberg, Germany, March 11-15, 2013. (Note : Watch also this video)
  19. [IC] SeungJin (beist) Lee and Seungjoo Kim, "Smart TV Security - #1984 in 21st century -", The 14th CanSecWest 2013, The 14th CanSecWest Applied Security Conference 2013, Vancouver, British Columbia, Canada, March 6-8, 2013.
  20. [IC] Kyoungju Kwak, Kwangwoo Lee, Dongho Won and Seungjoo Kim, "Analysis and Countermeasures of Security Vulnerability on Portal Sites", Proc. of ACM ICUIMC 2011, International Conference on Ubiquitous Information Management and Communication 2011, Suwon, Korea, February 21-23, 2011, pp.2-5.
  21. [IC] Hyunjung Lee, Dongho Won and Seungjoo Kim, "Protection Profile for E-Certificate Issuance System", Proc. of The 11th ICCC 2010, The 11th International Common Criteria Conference, on CD-ROM, Antalya, Turkey, September 21-23, 2010.
  22. [IC] Taehyun Kim, Dongho Won, Kwangwoo Lee, Hogab Kang, and Seungjoo Kim, "Automated DCI Compliance Test System for Digital Cinema Entities", Proc. of IEEE NCM 2010, International Conference on Networked Computing and Advanced Information Management 2010, Seoul, Korea, August 16-18, 2010, pp.434-439.
  23. [IC] Heasuk Jo, Seungjoo Kim, and Dongho Won, "A Study on Comparative Analysis of the Information Security Management Systems", Proc. of ICCSA 2010, The International Conference on Computational Science and Its Applications 2010, Springer-Verlag, LNCS 6019, Fukuoka, Japan, March 23-26, 2010, pp.510-519. (SCOPUS)
  24. [IC] Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won and Seungjoo Kim, "A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS)", Proc. of ISPEC 2010, Information Security Practice and Experience Conference 2010, Springer-Verlag, LNCS 6047, Seoul, Korea, March 12-13, 2010, pp.217-228. (SCOPUS)
  25. [IC] Kwangwoo Lee, Yunho Lee, Dongho Won and Seungjoo Kim, "Protection Profile for Secure E-Voting Systems", Proc. of ISPEC 2010, Information Security Practice and Experience Conference 2010, Springer-Verlag, LNCS 6047, Seoul, Korea, March 12-13, 2010, pp.386-397. (SCOPUS) (Best Paper Award)
  26. [IC] Sangsik Lee, Donghyun Choi, Dongho Won, and Seungjoo Kim, "Security Analysis on Commercial Online Music Streaming Service and Countermeasures", Proc. of ICUIMC 2010, International Conference on Ubiquitous Information Management and Communication 2010, Suwon, Korea, January 14-15, 2010, pp.408-414.
  27. [IC] Hyunsang Park, Kwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho Won, "Security Analysis on the Online Office and Proposal of the Evaluation Criteria", Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.198-204.
  28. [IC] Yunyoung Lee, Soonhaeng Hur, Dongho Won, and Seungjoo Kim, "Cipher Suite Setting Problem of SSL Protocol and It's Solutions", Proc. of FINA 2009, The Fifth International Symposium on Frontiers of Information Systems and Network Applications 2009, Bradford, UK, May 26-29, 2009, pp.140-146.
  29. [IC] Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won, "Security Specification for Conversion Technologies of Heterogeneous DRM Systems", Proc. of ISPEC 2009, Information Security Practice and Experience Conference 2009, Springer-Verlag, LNCS 5451, Xi'an, China, April 13-15, 2009, pp.159-170. (SCOPUS) (Acceptance Ratio: 23%)
  30. [IC] Jeonghoon Han, Dongho Won and Seungjoo Kim, "New Identity Management Scheme and Its Formal Analysis", Proc. of WASET 2009, World Academy of Science, Engineering and Technology 2009, Volume 49, Dubai, United Arab Emirates, January 28-29, 2009, pp.617-623. (Acceptance Ratio: 25%)
  31. [IC] Donghyun Choi, Sungkyu Cho, Dongho Won, and Seungjoo Kim, "Protection Profile for Connected Interoperable DRM Framework", Proc. of WISA 2008, International Workshop on Information Security Applications, Springer-Verlag, LNCS 5379, Jeju Island, Korea, September 23-25, 2008, pp.320-32. (SCOPUS) (Acceptance Ratio: 14.3%)
  32. [IC] Kwangwoo Lee, Yunho Lee, Woongryul Jeon, Dongho Won and Seungjoo Kim, "Protection Profile for E-Voting Systems", Proc. of The 9th ICCC 2008, The 9th International Common Criteria Conference, on CD-ROM, Jeju, Korea, September 23-25, 2008.
  33. [IC] Hanjae Jeong, Younsung Choi, Woongryel Jeon, Fei Yang, Yunho Lee, Seungjoo Kim, and Dongho Won, "Vulnerability Analysis of Secure USB Flash Drives", Proc. of IEEE MTDT 2007, The 15th IEEE International Workshop on Memory Technology, Design and Testing 2007, IEEE Computer Society, Taipei, Taiwan., December 3-5, 2007, pp.61-64.
  34. [IC] Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim and Dongho Won, "Security Analysis on the Authentication Mechanisms of Korean Popular Messengers", Proc. of HCI International 2007, 12th International Conference on Human-Computer Interaction, Springer-Verlag, LNCS 4554, Beijing, P.R.China, July 22-27, 2007, pp.547-552.
  35. [IC] Hanjae Jeong, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "Analysis of Composed TOE in the Common Criteria 3.1", Proc. of ICUIMC 2007, The First International Conference on Ubiquitous Information Management and Communication 2007, Suwon, Korea, February 8-9, 2007, pp.500-504.
  36. [IC] Yunyoung Lee, Donghwi Shin, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "The Threat Modeling and Choosing the Better Countermeasure", Proc. of ICUIMC 2007, The First International Conference on Ubiquitous Information Management and Communication 2007, Suwon, Korea, February 8-9, 2007, pp.174-181.

  37. [DJ]Ye-Seul Cha and Seungjoo Kim, "A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.27/No.6, December 2017, pp.1441-1455.
  38. [DJ]Eun-ju Park and Seungjoo Kim, "Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.27/No.6, December 2017, pp.1467-1482.
  39. [DJ] Heekyeong Noh, Changguk Choi, Minsu Park, and Seungjoo Kim, "Security Analysis on Password Authentication System of Web Sites", The Transactions of the KIPS (Korea Information Processing Society), Vol.3/No.12, December 2014, pp.463-478
  40. [DJ] Buil Kang and Seungjoo Kim, "Study on Security Grade Classification of Financial Company Documents", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.24/No.6, December 2014, pp.1319-1328.
  41. [DJ] Sunghwan Kim, Minsu Park, and Seungjoo Kim, "Shoulder Surfing Attak Modeling and Security Analysis on Commercial Keypad Schemes", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.24/No.6, December 2014, pp.1159-1174.
  42. [DJ] Ok Heo, and Seungjoo Kim "Information Security Management System Evaluation Criteria with Availability for Korean Smart Grid", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.24/No.3, June 2014, pp.547-560.
  43. [DJ] Jinseok Park, Heoosoo Kang, and Seungjoo Kim, "How to Combine Secure Software Development Lifecycle into Common Criteria", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.24/No.1, Febuary 2014, pp.171-182.
  44. [DJ] Jeongeun Park, Minsu Park, and Seungjoo Kim, "The Reliability Evaluation of User Account on Facebook", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.23/No.6, December 2013, pp.1087-1101.
  45. [DJ] Hwanseok Hur, Sunghoon Kang, and Seungjoo Kim, "A Proposal for Security Verification Method for Implementation of Secure Android Mobile Application", The Transactions of the KIPS (Korea Information Processing Society), Vol.2/No.10, October 2013, pp.445-460.
  46. [DJ] Kichul Kim, Ok Heo, and Seungjoo Kim, "A Security Evaluation Criteria for Korean Cloud Computing Service", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.23/No.2, April 2013, pp.3-17.
  47. [DJ] Sunghoon Kang and Seungjoo Kim, "Study on the Personal Information Retrieval of Smartphone Messenger Service", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.23/No.1, Februaty 2013, pp.1-11.
  48. [DJ] Deokhoon Yu and Seungjoo Kim, "Research on Military SNS Protection Profile for National Defense", Journal of the KSII (Journal of Korean Socieity for Internet Information), Vol.14/No.1, Februaty 2013, pp.41-52.
  49. [DJ] Kichul Kim and Seungjoo Kim, "Evaluation Criteria for Korean Smart Grid based On K-ISMS", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.22/No.6, December 2012, pp.1357-1391.
  50. [DJ] Yuna Hwang, Hanjae Jeong, Dongho Won, and Seungjoo Kim, "A Study of Evaluation Scheme for Exchangeable CAS (XCAS)", The Transactions of the KIPS (Korea Information Processing Society), Vol.17-C/No.5, October 2010, pp.407-414.
  51. [DJ] Woochan Hong, Kwangwoo Lee, Dongho Won, and Seungjoo Kim, "Vulnerabilities Analysis of the OTP Implemented on PC", The Transactions of the KIPS (Korea Information Processing Society), Vol.17-C/No.4, August 2010, pp.361-370.
  52. [DJ] Heasuk Jo, Seungjoo Kim, and Dongho Won, "A Study of Protection Profile and Analysis of Related Standard for Internet Banking Systems", The Transactions of the KIPS (Korea Information Processing Society), Vol.17-C/No.3, June 2010, pp.223-232.
  53. [DJ] Sangsik Lee, Donghyun Choi, Dongho Won, and Seungjoo Kim, "Security Analysis on Commercial Online Music Streaming Service and Countermeasures", The Transactions of the KIPS (Korea Information Processing Society), Vol.16-C/No.6, December 2009, pp.681-690.
  54. [DJ] Youngjun Cho, Kwangwoo Lee, Sungkyu Cho, Hyunsang Park, Hyoungseob Lee, Hyunseung Lee, Songyi Kim, Wookjae Cha, Woongryul Jeon, Dongho Won, Seungjoo Kim, "Development Testing/Evaluating Methods about Security Functions based on Digital Printer", The Transactions of the KIPS (Korea Information Processing Society), Vol.16-C/No.4, 2009, pp.461-476.
  55. [DJ] Heasuk Jo, Kwangwoo Lee, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won, "A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems", The Transactions of the KIPS (Korea Information Processing Society), Vol.16-C/No.1, February 2009, pp.1-12.
  56. [DJ] Yunyoung Lee, Soonhaeng Hur, Sangjoo Park, Donghwi Shin, Dongho Won, and Seungjoo Kim, "CipherSuite Setting Problem of SSL Protocol and It's Solutions", The Transactions of the KIPS (Korea Information Processing Society), Vol.15-C/No.5, October 2008, pp.359-366.
  57. [DJ] Soonhaeng Hur, Kwangwoo Lee, Heasuk Jo, Hanjae Jeong, Woongryul Jeon, Dongho Won, and Seungjoo Kim, "A Study on Development of Information Security Evaluation Model", The Transactions of the KIPS (Korea Information Processing Society), Vol.15-C/No.3, June 2008, pp.173-190.
  58. [DJ] Jeonghoon Han, Byunghee Lee, Sumin Hong, Seunghyun Kim, Dongho Won, and Seungjoo Kim, "Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria", The Transactions of the KIPS (Korea Information Processing Society), Vol.15-C/No.2, April 2008, pp.125-132.
  59. [DJ] Yunyoung Lee, Haelahng Choi, Jeonghoon Han, Sumin Hong, Sungjin Lee, Donghwi Shin, Yunho Lee, Seungjoo Kim, and Dongho Won, "Security Analysis on the Home Trading System Service and Proposal of the Evaluation Criteria", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.18/No.1, February 2008, pp.115-137.
  60. [DJ] Hanjae Jeong, Younsung Choi, Woong-Ryul Jeon, Fei Yang, Yunho Lee, Seungjoo Kim, and Dongho Won, "Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.6, December 2007, pp.99-120.
  61. [DJ] Younsung Choi, Yunho Lee, Seungjoo Kim, and Dongho Won, "Security Analysis on the Implementation Vulnerabilities of I-PIN", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.2, April 2007, pp.145-185.
  62. [DJ] He Zheng, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "A Study on the Security Requirements for Developing Protection Profiles", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.1, February 2007, pp.133-138.
  63. [DJ] Woong-Ryul Jeon, Heasuk Jo, Seungjoo Kim, and Dongho Won, "A Protection Profile for Access Control Based Database Security System", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.1, February 2007, pp.109-113.
  64. [DJ] Donghwi Shin, Younsung Choi, Sangjoon Park, Seungjoo Kim, and Dongho Won, "Cryptanalysis on the Authentication Mechanism of the NateOn Messenegr", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.1, February 2007, pp.67-80.


Trustworthy and High-Assurance Systems & Networks

  1. [IJ] Seungsoo Baek, Seung-Hyun Seo and Seungjoo Kim, "Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment", International Journal of Distributed Sensor Networks - Special issue on Challenges of Wireless Sensor Networks for IoT Applications, Hindawi Publishing Corporation, July 2016, Volume 12, Issue 7, pp.1-10. (SCI-E, SCOPUS, IF:0.906)
  2. [IJ] Jonghan Lee, Kyumin Cho, ChangYong Lee, and Seungjoo Kim, "VoIP-aware Network Attack Detection based-on Statistic and Behavior of SIP Traffic", Peer-to-Peer Networking and Applications, Springer, September 2015, Volume 8, Issue 5, pp.872-880. (SCI-E, SCOPUS, IF:1.000)
  3. [IJ] Seungsoo Baek, and Seungjoo Kim, "Trust-based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment", Scientific World Journal, Hindawi Publishing Corporation, Volume 2014, October 2014, pp.1-8. (SCI-E, SCOPUS, IF:1.73)
  4. [IJ] Donghwi Shin, Chaetae Im, Hyuncheol Jeong, Seungjoo Kim, and Dongho Won, "The New Signature Generation Method Based on an Unpacking Algorithm and Procedure for a Packer Detection", International Journal of Advanced Science and Technology, Vol.29, April 2011, pp.83-100.
  5. [IJ] Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won and Seungjoo Kim, "Secure and Efficient Code Encryption Scheme based on the Indexed Table", ETRI Journal, Vol.33, No.1, February 2011, pp.60-70. (SCI, SCOPUS, IF:0.916)
  6. [IJ] Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim, and Dongho Won, "Towards Trustworthy e-Voting using Paper Receipts", Elsevier Computer Standards & Interfaces, Volume 32, Issue 5-6, October 2010, pp.305-311. (SCI-E, SCOPUS, IF:1.373)
  7. [IJ] Jin Kwak, Keunwoo Rhee, Seungjoo Kim, and Dongho Won, "Unlinkable and Traceable EPC System for Consumer Privacy", IJCSNS, International Journal of Computer Science and Network Security, Vol.5, No.12, 30 December, 2005, pp.75-81.

  8. [IC] Seungjoo Kim, "[Keynote] Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -", The 7th SECUINSIDE 2017, Seoul, Korea, July 10-11, 2017.
  9. [IC] Seungsoo Baek, Seung-Hyun Seo and Seungjoo Kim, "Preserving Biosensor Users' Anonymity over Wireless Cellular Network", Proc. of IEEE ICUFN 2015, International Conference on Ubiquitous and Future Networks 2015, Sapporo, Japan, 7-10 July, 2015, pp.470-475.
  10. [IC] Seungjin Son, Kwangwoo Lee, Dongho Won and Seungjoo Kim, "U-Healthcare System Protecting Privacy Based on Cloaker", Proc. of IEEE BIBM 2010, International Conference on Bioinformatics & Biomedicine 2010, Hong Kong, China, December 18-21, 2010, pp.417-423.
  11. [IC] Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won, Seungjoo Kim, "A Practical Approaches to Code Encryption Method against Reverse Engineering", Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.151-158.
  12. [IC] Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won, "Off-line Password-Guessing Attack to Yang's and Huang's Authentication Schemes Authentication Schemes for Session Initiation Protocol", Proc. of NCM 2009, International Joint Conference on INC, IMS and IDC 2009, Seoul, Korea, August 25-27, 2009, pp.618-621.
  13. [IC] Kwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho Won, "A Practical Approach to a Reliable Electronic Election", Proc. of ICCSA 2009, The International Conference on Computational Science and Its Applications 2009, Springer-Verlag, LNCS 5593, Yongin, Korea, June 29 - July 2, 2009, pp.191-203. (SCOPUS)
  14. [IC] Yunho Lee, Seungjoo Kim, and Dongho Won, "How to Trust DRE Voting Machines Preserving Voter Privacy", Proc. of IEEE ICEBE 2008, International Conference on e-Business Engineering 2008, IEEE Computer Society, Xi'AN, China, October 22-24, 2008, pp.302-307.
  15. [IC] Namje Park, Dooho Choi, Seungjoo Kim, and Dongho Won, "Enforcing Security in Mobile RFID Networks: Multilateral Approaches and Solutions", Proc. of IEEE/IFIP NOMS 2008, The 11th IEEE/IFIP Network Operations & Management Symposium 2008, IEEE Computer Society, Salvador, Brazil, April 7-11, 2008, pp.999-1002.
  16. [IC] Namje Park, Seungjoo Kim, and Dongho Won, "Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network", Proc. of AWIC 2007, The 5th Atlantic Web Intelligence Conference, Springer-Verlag, Advances in Soft Computing 43, Fontainebleau, France, June 25-27, 2007, pp.278-283.
  17. [IC] Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, "Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services", Proc. of KES 2006, 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer-Verlag, LNAI 4251, Bournemouth, UK, October 9-11, 2006, pp.924-934. (SCI-E, Acceptance Ratio: 34%)
  18. [IC] Namje Park,, Seungjoo Kim, Dongho Won, and Howon Kim, "Security Analysis and Implementation Leveraging Globally Networked Mobile RFIDs", Proc. of PWC 2006, IFIP TC6 11th International Conference on Personal Wireless Communications, Springer-Verlag, LNCS 4217, Albacete, Spain, Sep 20-22, 2006, pp.494-505. (SCI-E, Acceptance Ratio: 24%)
  19. [IC] Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts", Proc. of WOTE 2006, IAVoSS Workshop On Trustworthy Elections (in conjunction with the 6th Workshop on Privacy Enhancing Technologies), Robinson College, Cambridge, United Kingdom, June 28-30, 2006, pp.145-152.
  20. [IC] Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment", Proc. of ICSE 2006, International Workshop on Web-based Internet Computing for Science and Engineering (in conjunction with APWeb 2006), Springer-Verlag, LNCS 3842, Harbin, China, January 18, 2006, pp.741-748. (SCI-E, Acceptance Ratio: 9%)
  21. [IC] Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, and Dongho Won, "XML-based Security Acceleation Methods Supporting Fast Mobile Grid", Proc. of EC-Web 2005, International Conference on Electronic Commerce and Web Technologies (in conjunction with DEXA 2005), Springer-Verlag, LNCS 3590, Copenhagen, Denmark, August 22-26, 2005, pp.316-326. (SCI-E, IF:0.402)
  22. [IC] Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, and Dongho Won, "XKMS-based Key Management for Open LBS in Web Services Environment", Proc. of AWIC 2005, The 3rd Atlantic Web Intelligence Conference, Springer-Verlag, LNAI 3528, Poland, June 6-9, 2005, pp.367-373. (SCI-E, IF:0.402)
  23. [IC] Namje Park, Howon Kim, Seungjoo Kim, Dongho Won, "Open Location-based Service using Secure Middleware Infrastructure in Web Services", Proc. of UWSI 2005, Ubiquitous Web Systems and Intelligence Workshop, Springer-Verlag, LNCS 3481, Singapore, May 9-12, 2005, pp.1146-1155. (SCI-E, IF:0.402)

  24. [DJ] Myunghee Choi and and Seungjoo Kim, "Automated Method for the Efficient Management of DNSSEC Signing Keys in Korea", The Transactions of the KIPS (Korea Information Processing Society), Vol.4/No.8, August 2015, pp.259-270
  25. [DJ] Guiseok Kim and Seungjoo Kim, "OTACUS: Parameter-Tampering Prevention Techniques Using Clean URL", Journal of the KSII (Journal of Korean Socieity for Internet Information), Vol.15/No.6, December 2014, pp.55-64.
  26. [DJ] Woosuk Kim, Sunghoon Kang, Kyungshin Kim, and Seungjoo Kim, "Detecting ShellCode Using Entropy", The Transactions of the KIPS (Korea Information Processing Society), Vol.3/No.2, March 2014, pp.59-68.
  27. [DJ]Seungsoo Baek and Seungjoo Kim, "Study on Dynamic Trust-based Access Control in Online Social Network Environment", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.23/No.6, December 2013, pp.1025-1035.
  28. [DJ] Minsu Park, Sunghoon Kang, and Seungjoo Kim, "Weakness and Improvement of Cloud Shredder", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.38/No.5, May 2013, pp.401-409.
  29. [DJ] Woongryul Jeon, Hyunseung Lee, Sunhang Hur, Kyungsin Kim, Dongho Won, and Seungjoo Kim, "Improvement of Internet Content Filtering Software", The Transactions of the KIPS (Korea Information Processing Society), Vol.16-C/No.5, October 2009, pp.543-554.
  30. [DJ] Yunho Lee, Kwangwoo Lee, Sangjoon Park, Seungjoo Kim, and Dongho Won, "A Secure Receipt Issuing Scheme for e-Voting with Improved Usability", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.4, August 2007, pp.75-88.
  31. [DJ] Kwangwoo Lee, Yunho Lee, Dongho Won and Seungjoo Kim, "A Voter Verifiable Receipt in Electronic Voting with Improved Reliability", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.16/No.4, August 2006, pp.119-126.

  32. [TR] Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "Towards Trustworthy e-Voting using Paper Receipts", IACR Cryptology ePrint Archive: Report 2006/167, 12 May 2006.


High-Assurance Cryptography

  1. [IJ] Donghyun Choi, Hanjae Jeong, Dongho Won, and Seungjoo Kim, "Hybrid Key Management Architecture for Robust SCADA Systems", Journal of Information Science and Engineering, Vol.29, No.2, March 2013, pp.281-298. (SCI-E, SCOPUS, IF:0.299)
  2. [IJ] Donghyun Choi, Kwangwoo Lee, and Seungjoo Kim, "Efficient Authorized Domain DRM System without Revocation List", Information - An International Interdisciplinary Journal, International Information Institute, Vol.15, No.5, May 2012, pp.2333-2343. (SCI-E, SCOPUS, IF:0.25)
  3. [IJ] Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, and Seungjoo Kim, "Efficient Certificateless Proxy Signature Scheme with Provable Security", Information Sciences, Volume 188, Elsevier Science Inc, 1 April 2012, pp.322-337. (SCI, SCOPUS, IF:3.643)
  4. [IJ] Kwangwoo Lee, Dongho Won, and Seungjoo Kim, "A Secure and Efficient E-Will System Based on PKI", Information - An International Interdisciplinary Journal, International Information Institute, Vol.14, No.7, July 2011, pp.2187-2206. (SCI-E, SCOPUS, IF:0.06)
  5. [IJ] Hanjae Jeong, Dongho Won, Seungjoo Kim, "Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol", Journal of Information Science and Engineering, Vol.26, No.5, September 2010, pp.1845-1858. (SCI-E, SCOPUS, IF:0.315)
  6. [IJ] Donghyun Choi, Sungjin Lee, Dongho Won, and Seungjoo Kim, "Efficient Secure Group Communications for SCADA", IEEE Transactions on Power Delivery, Vol.25, No.2, April 2010, pp.714-722. (SCI, SCOPUS, IF:1.161)
  7. [IJ] Yunho Lee, Seungjoo Kim, Dongho Won, "Enhancement of Two-Factor Authenticated Key Exchange Protocols in Public Wireless LANs", Elsevier Computers and Electrical Engineering, Volume 36, Issue 1, January 2010, pp.213-223. (SCI-E, IF:0.475)
  8. [IJ] Mijin Kim, Byunghee Lee, Seungjoo Kim, and Dongho Won, "Weaknesses and Improvements of a One-time Password Authentication Scheme", SERSC : International Journal of Future Generation Communication and Networking, Vol.2, No.4, December 2009, pp.29-38.
  9. [IJ] Donghyun Choi, Hakman Kim, Dongho Won, and Seungjoo Kim, "Advanced Key Management Architecture for Secure SCADA Communications", IEEE Transactions on Power Delivery, Vol.24, No.3, July 2009, pp.1154-1163. (SCI, SCOPUS, IF:1.29)
  10. [IJ] Junghyun Nam, Youngsook Lee, Seungjoo Kim, and Dongho Won, "Security Weakness in a Three-Party Pairing-Based Protocol for Password Authenticated Key Exchange", Information Sciences, Volume 177, Issue 6, Elsevier Science Inc, 15 March 2007, pp.1364-1375. (SCI, IF:2.147)
  11. [IJ] Junghyun Nam, Seungjoo Kim, Sangjoon Park, and Dongho Won, "Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards", IEICE Trans. Fundamentals, Vol.E90-A, No.1, January 2007, pp.299-302. (SCI-E, IF:0.287)
  12. [IJ] Yunho Lee, Seungjoo Kim, and Dongho Won, "Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol", IEICE Trans. Fundamentals, Vol.E89-A, No.7, July 2006, pp.2084-2087. (SCI-E, IF:0.312)
  13. [IJ] Jaeil Lee, Jong Wook Park, Seungjoo Kim, and JooSeok Song, "PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate", IJCSNS, International Journal of Computer Science and Network Security, Vol.6, No.6, 30 June, 2006, pp.204-208. (Note : See also the IETF standard, "RFC 4683 : Internet X.509 Public Key Infrastructure Subject Identification Method (SIM)", October 10, 2006.)
  14. [IJ] Hyunjue Kim, Seungjoo Kim, and Dongho Won, "Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow", IJCSNS, International Journal of Computer Science and Network Security, Vol.6, No.1, 30 January, 2006, pp.247-250.
  15. [IJ] Junghyun Nam, Seungjoo Kim, and Dongho Won, "Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme", IEICE Trans. Fundamentals, Vol.E89-A, No.1, January 2006, pp.213-218. (SCI-E, IF:0.312)
  16. [IJ] Junghyun Nam, Seungjoo Kim, and Dongho Won, "Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols using Passwords", IEICE Trans. Fundamentals, Vol.E89-A, No.1, January 2006, pp.209-212. (SCI-E, IF:0.312)
  17. [IJ] Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won, "DDH-based Group Key Agreement in a Mobile Environment", Journal of Systems and Software, Volume 78, Issue 1, Elsevier Science Inc, October 2005, pp.73-83. (SCI-E, IF:0.744)
  18. [IJ] Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho Won, "A Method for Detecting the Exposure of an OCSP Responder's Private Key using One-Time Hash Value", IJCSNS, International Journal of Computer Science and Network Security, Vol.5, No.8, 30 August, 2005, pp.179-186.
  19. [IJ] Junghyun Nam, Woosuk Chang, Jeeyeon Kim, Seungjoo Kim, and Dongho Won, "A Provably Secure Key Exchange Scheme for Dynamic Groups", IJCSNS, International Journal of Computer Science and Network Security, Vol.5, No.8, 30 August, 2005, pp.134-145.
  20. [IJ] Seungjoo Kim and Dongho Won, "Privacy-Enhanced Public-Key Certificate: How to Embed an Individual's Sensitive Information into A Certificate", Trends in Mathematics, Vol.8, No.1, ICMS(Information Center for Mathematical Science), June 2005, pp.21-28.
  21. [IJ] Junghyun Nam, Seungjoo Kim, and Dongho Won, "A Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices", IEEE Communications Letters, Volume 9, Issue 5, May 2005, pp.429-431. (SCI, IF:1.058)
  22. [IJ] Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, and Seonhee Yoon, "Differential and Linear Cryptanalysis for 2-round SPNs", Information Processing Letters, Volume 87, Issue 5, Elsevier, 15 September 2003, pp.277-282 (SCI-E, IF:0.473)
  23. [IJ] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and SangJae Moon, "RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis", IEEE Transactions on Computers - Special issue on CHES, Vol.52, No.4, April 2003, pp.461-472. (SCI, IF:1.919)
  24. [IJ] Seungjoo Kim, Seongan Lim, and Dongho Won, "Cryptanalysis of Flexible Remote Password Authentication Scheme of ICN'01 (of Springer LNCS 2093)", Electronics Letters 38(24), IEE Press, 21 November 2002, pp.1519-1520. (SCI, IF:1.072)
  25. [IJ] Seungjoo Kim, Masahiro Mambo, Takeshi Okamoto, Hiroki Shizuya, Mitsuru Tada and Dongho Won, "On The Security of The Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks", IEICE Trans. Fundamentals, Vol.E84-A, No.1, January 2001, pp.231-238. (SCI-E, IF:0.346)
  26. [IJ] Seungjoo Kim, Byungchun Kim and Sungjun Park, "Comments on Password-Based Private Key Download Protocol of NDSS'99", Electronics Letters 35(22), IEE Press, 7 September 1999, pp.1937-1938. (SCI, IF:1.164)
  27. [IJ] Sangjoon Park, Seungjoo Kim and Dongho Won, "ID-Based Group Signature", Electronics Letters 33(19), IEE Press, 11 September 1997, pp.1616-1617. (SCI, IF:1.005) (Note : The algorithms in this paper had been broken at W.Mao's AsiaCrypt'98 paper and revised again by the authors.)

  28. [IC] Kwangwoo Lee, Dongho Won, and Seungjoo Kim, "A Practical Approach to a Secure E-Will System in the R.O.C.", Proc. of IEEE CUTE 2010, International Conference on Ubiquitous Information Technologies and Applications 2010, Sanya, China, December 16-18, 2010, pp.1-6.
  29. [IC] Mijin Kim, Seungjoo Kim, and Dongho Won, "An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity", Proc. of WISM 2010, International Conference on Web Information Systems and Mining 2010, Springer-Verlag, LNCS 6318,, Sanya, China, October 23-24, 2010, pp.244-253.
  30. [IC] Dongbum Lee, Kwangwoo Lee, Seungjoo Kim, Woong Go, Dongho Won, and Jin Kwak, "A Secure Key Management Scheme for Multi-Agent base Sensor Cloud Computing in Wireless Network", Proc. of JWIS 2010, The 5th Joint Workshop on Information Security 2010, South China Agricultural University, Guangzhou, P.R.China, August 05-06, 2010, pp.272-286.
  31. [IC] Mijin Kim, Byunghee Lee, Seungjoo Kim, Dongho Won, "Weaknesses and Improvements of Kuo-Lee's One-time Password Authentication Scheme", Proc. of FGCN/ACN 2009, International Conference on Future Generation Communication and Networking 2009, Springer-Verlag, Communications in Computer and Information Science 56, Jeju, Korea, December 10-12, 2009, pp.421-430.
  32. [IC] Hyunseung Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim, "Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs", Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.194-197.
  33. [IC] Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim, "Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol", Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.190-193.
  34. [IC] Songyi kim, Kwangwoo Lee, Seungjoo Kim, Dongho Won, "Security Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and Its Improvement", Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.460-464.
  35. [IC] Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won, "Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key", Proc. of ICCSA 2009, The International Conference on Computational Science and Its Applications 2009, Springer-Verlag, LNCS 5593, Yongin, Korea, June 29 - July 2, 2009, pp.204-211. (SCOPUS)
  36. [IC] Wansuck Yi, Seungjoo Kim, Dongho Won, "Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environment", Proc. of ICCSA 2009, The International Conference on Computational Science and Its Applications 2009, Springer-Verlag, LNCS 5593, Yongin, Korea, June 29 - July 2, 2009, pp.182-190. (SCOPUS)
  37. [IC] Sumin Hong, Woongryul Jeon, Seungjoo Kim, Dongho Won, and Choonsik Park, "The Vulnerabilities analysis of Fuzzy Vault using Password", Proc. of BSBT 2008, The International Conference on Bio-Science and Bio-Technology 2008, IEEE Computer Society, Volume III, Hainan Island, China, December 13-15, 2008, pp.76-83. (Acceptance Ratio: 24%)
  38. [IC] Sungjin Lee, Donghyun Choi, Choonsik Park, and Seungjoo Kim, "An Efficient Key Management Scheme for Secure SCADA Communication", Proc. of ICPEPE 2008, International Conference on Power Electronics and Power Engineering 2008, Laval, France, November 21-23, 2008, pp.458-464. (Acceptance Ratio: 20%)
  39. [IC] Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, and Dongho Won, "An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack", Proc. of ATC-07, The 4th International Conference on Autonomic and Trusted Computing, Springer-Verlag, LNCS 4610, Hong Kong, China, July 11-13, 2007, pp.135-145. (Acceptance Ratio: 24.6%)
  40. [IC] Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won, "A Countermeasure of Fake Root Key Installation using One-Time Hash Chain", Proc. of KES AMSTA 2007, KES Symposium on Agent and Multi-Agent Systems, Springer-Verlag, LNCS 4496, Wroclaw, Poland, May 31 - June 1, 2007, pp.1007-1016. (Acceptance Ratio: 25.86%)
  41. [IC] Sangjoon Park, Junghyun Nam, Seungjoo Kim and Dongho Won, "Efficient Password-Authenticated Key Exchange Based on RSA", Proc. of The 7th CT-RSA 2007, The 7th Cryptographers' Track at RSA Conference, Springer-Verlag, LNCS 4377, San Francisco, February 5-9, 2007, pp.309-323. (Acceptance Ratio: 34.24%)
  42. [IC] Sungjin Lee, Seokhyun Jang, Yongwook Kim, Donghyun Choi, Seungjoo Kim, and Dongho Won, "Mobile P2P Group Communication Protocol for Confidence and Anonymity", Proc. of ICUIMC 2007, The First International Conference on Ubiquitous Information Management and Communication 2007, Suwon, Korea, February 8-9, 2007, pp.166-173.
  43. [IC] Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, and Dongho Won, "Group Key Agreement Protocol Among Mobile Devices in Different Cells", Proc. of ISPA 2006, International Symposium on Parallel and Distributed Processing and Applications, Springer-Verlag, LNCS 4331, Sorrento, Italy, 1-4 December, 2006, pp.1090-1097. (Acceptance Ratio: 31.57%)
  44. [IC] Woosuk Chang, Hyunjue Kim, Junghyun Nam, Seokhyang Cho, Yunho Lee, Hogab Kang, Dongho Won, Seungjoo Kim, "New Pay-TV Conditional Access System Using A Group Key Agreement Protocol", Proc. of ICHIT 2006, International Conference on Hybrid Information Technology, Springer-Verlag, LNCS ????, Cheju Island, Korea, November 9-11, 2006, pp.?-?. (Acceptance Ratio: 20.84%)
  45. [IC] Keunwoo Rhee, Jin Kwak, Wansuk Lee, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won, "Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation", Proc. of ICHIT 2006, International Conference on Hybrid Information Technology, Springer-Verlag, LNAI 4413, Cheju Island, Korea, November 9-11, 2006, pp.607-616. (Acceptance Ratio: 20.84%)
  46. [IC] Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won, "RFID System Based MCLT System with Improved Privacy", Proc. of Trust 2006, Trustworthiness, Reliability and services in Ubiquitous and Sensor neTworks, Springer-Verlag, LNCS 4097, Seoul, Korea, August 1-4, 2006, pp.579-590. (SCI-E, Acceptance Ratio: 27%)
  47. [IC] Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho Won, "A PKI System for Detecting the Exposure of a User's Secret Key", Proc. of EuroPKI 2006, European PKI Workshop: Research and Applications, Springer-Verlag, LNCS 4043, Politecnico di Torino, Sala Consiglio di Facolta, Torino (Italy), June 19 - 20, 2006, pp.248-250. (SCI-E, Acceptance Ratio: 44%)
  48. [IC] Youngsook Lee, Junghyun Nam, Seungjoo Kim, and Dongho Won, "Two Efficient and Secure Authentication Schemes Using Smart Cards", Proc. of ICCSA 2006, International Conference on Computational Science and Its Applications, Springer-Verlag, LNCS 3984, The Hilton Glasgow Hotel, Glasgow, UK, May 8-11, 2006, pp.858-866. (SCI-E, Acceptance Ratio: 27.10%)
  49. [IC] He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, and Dongho Won, "Confidence Value based Multi Levels of Authentication for Ubiquitous Computing Environments", Proc. of ICCSA 2006, International Conference on Computational Science and Its Applications - Authentication Authorization Accounting (AAA) Workshop, Springer-Verlag, LNCS 3981, The Hilton Glasgow Hotel, Glasgow, UK, May 8-11, 2006, pp.954-963. (SCI-E, Acceptance Ratio: 27.10%)
  50. [IC] Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, and Dongho Won, "XML-Based Digital Signature Accelerator in Open Mobile Grid Computing", Proc. of GCC 2005, International Conference on Grid and Cooperative Computing, Springer-Verlag, LNCS 3795, Beijing, China, November 30 - December 3, 2005, pp.323-333. (SCI-E, IF:0.402)
  51. [IC] Hyunjue Kim, Junghyun Nam, Seungjoo Kim, and Dongho Won, "Secure and Efficient ID-based Group Key Agreement fitted for Pay-TV", Proc. of PCM 2005, The 2005 Pacific-Rim Conference on Multimedia, Springer-Verlag, LNCS 3768, Jeju Island, Korea, November 13-16, 2005, pp.117-128. (SCI-E, IF:0.402)
  52. [IC] Junghyun Nam, Seungjoo Kim, and Dongho Won, "Secure Group Communications over Combined Wired and Wireless Networks", Proc. of TrustBus 2005, International Conference on Trust, Privacy, and Security in Digital Business (in conjunction with DEXA 2005), Springer-Verlag, LNCS 3592, Copenhagen, Denmark, August 22-26, 2005, pp.90-99. (SCI-E, IF:0.402)
  53. [IC] Junghyun Nam, Seungjoo Kim, and Dongho Won, "Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols", Proc. of WISA 2005, International Workshop on Information Security Applications, Springer-Verlag, LNCS 3786, Jeju Island, Korea, August 22-24, 2005, pp.1-9. (SCI-E, IF:0.402)
  54. [IC] Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, and Dongho Won, "RFID System with Fairness within the Framework of Security and Privacy", Proc. of ESAS 2005, European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Springer-Verlag, LNCS 3813, Visegrad, Hungary, July 13-14, 2005, pp.142-152. (SCI-E, IF:0.402)
  55. [IC] Younggyo Lee, Injung Kim, Seungjoo Kim, and Dongho Won, "A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS", Proc. of EuroPKI 2005, European PKI Workshop: Research and Applications, Springer-Verlag, LNCS 3545, University of Kent, England, June 30 - July 1, 2005, pp.215-226. (SCI-E, IF:0.402)
  56. [IC] Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, and Hyungkyu Yang, "Practical and Provably-Secure Multicasting over High-Delay Networks", Proc. of ICCS 2005, International Conference on Computational Science 2005, Springer-Verlag, LNCS 3515, Atlanta, USA, May 22-25, 2005, pp.493-501. (SCI-E, IF:0.402) (Note : Full version : Cryptology ePrint Archive: Report 2004/115.)
  57. [IC] Seokhyang Cho, Junghyun Nam, Seungjoo Kim, and Dongho Won, "An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices", Proc. of ICCSA 2005, International Conference on Computational Science and Its Applications, Springer-Verlag, LNCS 3480, Singapore, May 9-12, 2005, pp.498-507. (SCI-E, IF:0.402)
  58. [IC] Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, "Challenge-Response based RFID Authentication Protocol for Distributed Database Environment", Proc. of SPC 2005, International Conference on Security in Pervasive Computing, Springer-Verlag, LNCS 3450, Boppard, Germany, April 6-8, 2005, pp.70-84. (SCI-E, IF:0.402)
  59. [IC] Seungjoo Kim and Dongho Won, "Threshold Entrusted Undeniable Signature", Proc. of ICISC 2004, International Conference on Information Security and Cryptology, Springer-Verlag, LNCS 3506, Seoul, Korea, December 2-3 2004, pp.195-203. (SCI-E, IF:0.513) (Note : See also Bruce Schneier's "Applied Cryptography (2nd Ed.)", p.82.)
  60. [IC] Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won, "Dynamic Group Key Exchange over High Delay Networks", Proc. of ISPC COMM 2004, International Scientific-Practical Conference on Communication 2004, Issyk-Kul Lake, Kyrgyzstan, August 22-29, 2004, pp.262-267.
  61. [IC] Jeeyeon Kim, Seungjoo Kim, Jin Kwak and Dongho Won, "Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords", Proc. of ICCSA 2004 (Part I), International Conference on Computational Science and Its Applications - Internet Communication Security Workshop, Springer-Verlag, LNCS 3043, S. Maria degli Angeli, Assisi(PG), Italy, May 14-17, 2004, pp.895-902. (SCI-E, IF:0.513)
  62. [IC] Junghyun Nam, Seokhyang Cho, Seungjoo Kim, and Dongho Won, "Simple and Efficient Group Key Agreement Based on Factoring", Proc. of ICCSA 2004 (Part I), International Conference on Computational Science and Its Applications - Authentication Authorization Accounting (AAA) Workshop, Springer-Verlag, LNCS 3043, S. Maria degli Angeli, Assisi(PG), Italy, May 14-17, 2004, pp.645-654. (SCI-E, IF:0.513)
  63. [IC] Ikkwon Yie, Seongan Lim, Seungjoo Kim, and Dongryeol Kim, "Prime Numbers of Diffie-Hellman Groups for IKE-MODP", Progress in Cryptology - IndoCrypt 2003, Springer-Verlag, LNCS 2904, India, 8-10 December, 2003, pp.228-234. (SCI-E)
  64. [IC] Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, and Dongho Won, "An Improvement of VeriSign's Key Roaming Service Protocol", Proc. of ICWE 2003, International Conference on Web Engineering, Springer-Verlag, LNCS 2722, Oviedo, Asturias, Spain, July 14-18, 2003, pp.281-288. (SCI-E)
  65. [IC] Seungjoo Kim, Masahiro Mambo, and Yuliang Zheng, "Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption", Proc. of The 3rd CT-RSA 2003, The 3rd Cryptographers' Track at RSA Conference, Springer-Verlag, LNCS 2612, San Francisco, April 13-17, 2003, pp.227-243. (SCI-E)
  66. [IC] Jung-Yeun Lee, Jung Hee Cheon, and Seungjoo Kim, "An Analysis of Proxy Signatures : Is A Secure Channel Necessary?", Proc. of The 3rd CT-RSA 2003, The 3rd Cryptographers' Track at RSA Conference, Springer-Verlag, LNCS 2612, San Francisco, April 13-17, 2003, pp.68-79. (SCI-E)
  67. [IC] Seongan Lim, Seungjoo Kim, Ikkwon Yie and Jaemoon Kim, "Comments on A Signature Scheme Based on The Third Order LFSR Proposed at ACISP 2001", Progress in Cryptology - IndoCrypt 2001, Springer-Verlag, LNCS 2247, India, 16-20 December, 2001, pp.308-315. (SCI-E, IF:0.415)
  68. [IC] Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng, "Strong Adaptive Chosen-Ciphertext Attack with Memory Dump (Or : The Importance of The Order of Decryption and Validation)", Eighth IMA Conference on Cryptography and Coding 2001, Springer-Verlag, LNCS 2260, Royal Agricultural College, Cirencester, UK, December 17-19, 2001, pp.114-127. (SCI-E, IF:0.415) (Note : See also Phong Nguyen's STORK Report, "D4 New Trends in Cryptology, version 1.4, 22 May 2003", p.52.)
  69. [IC] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon, "A Countermeasure Against One Physical Cryptanalysis May Benefit Another Attack", Proc. of ICISC 2001, International Conference on Information Security and Cryptology, Springer-Verlag, LNCS 2288, Seoul, Korea, December 6-7 2001, pp.414-427. (SCI-E, IF:0.415)
  70. [IC] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon, "RSA Speedup With Residue Number System Immune Against Hardware Fault Cryptanalysis", Proc. of ICISC 2001, International Conference on Information Security and Cryptology, Springer-Verlag, LNCS 2288, Seoul, Korea, December 6-7 2001, pp.397-413. (SCI-E, IF:0.415)
  71. [IC] Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, and Hongsub Lee, "XTR extended to GF(p6m)", Eighth Annual Workshop on Selected Areas in Cryptography - SAC 2001, Springer-Verlag, LNCS 2259, Toronto (Canada), August 16-17, 2001, pp.301-312. (SCI-E, IF:0.415)
  72. [IC] Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, and Dongho Won, "Forward-Secure Commercial Key Escrow Systems", Proc. of WET-ICE 2001 / Enterprise Security Workshop, IEEE 10th Intl. Workshop on Enabling Technologies : Infrastructure for Collaborative Enterprises, Massachusetts Institute of Technology, Cambridge, MA, USA, June 20-22, 2001, pp.211-216.
  73. [IC] Seongan Lim, Seungjoo Kim, Ikkwon Yie, and Hongsub Lee, "A Generalized Takagi-Cryptosystem With a Modulus of the Form prqs", Bimal Roy, Eiji Okamoto (Eds.): Progress in Cryptology - IndoCrypt 2000, Springer-Verlag, LNCS 1977, Calcutta, India, December 10-13 2000, pp.283-294. (SCI-E, IF:0.39)
  74. [IC] Seungjoo Kim, Masahiro Mambo, Hiroki Shizuya and Dongho Won, "On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme Against Active Attacks", Proc. of JW-ISC'2000, Japan-Korea Joint Workshop on Information Security and Cryptology, Naha, Okinawa, Japan, January 25-26 2000, pp.191-198.
  75. [IC] Marc Joye, Seungjoo Kim and Narn-Yih Lee, "Cryptanalysis of Two Group Signature Schemes", Masahiro Mambo, Yuliang Zheng (Eds.): Proc. of ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, November 6-7 1999, pp.271-275. (SCI-E, IF:0.872)
  76. [IC] Seungjoo Kim, Insoo Lee, Masahiro Mambo and Sungjun Park, "On the Difficulty of Key Recovery Systems", Masahiro Mambo, Yuliang Zheng (Eds.): Proc. of ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, November 6-7 1999, pp.207-224. (SCI-E, IF:0.872)
  77. [IC] Seungjoo Kim, Soohyun Oh, Sangjoon Park and Dongho Won, "Verifiable Self-Certified Public Keys", Daniel AUGOT and Claude CARLET (Eds.): Proc. of WCC'99, INRIA Workshop on Coding and Cryptography, Paris, France, January 11-14 1999, pp.139-148 ; Proceedings published by INRIA, France ISBN 2-7261-1136-X.
  78. [IC] Seungjoo Kim, Soohyun Oh, Kyungkug Kim and Dongho Won, "One-Time Self-Certified Public Keys, Revisited", Proc. of ICISC'98, International Conference on Information Security and Cryptology, Vol.1/No.1, Seoul, Korea, December 18-19 1998, pp.59-69 ; ISBN 89-85305-14-X.
  79. [IC] Seungjoo Kim, Sangjoon Park, and Dongho Won, "Proxy Signatures, Revisited", Han, Okamoto, Quing (Eds.): Proc. of The 1st ICICS'97, The 1st International Conference on Information and Communications Security, Springer-Verlag, LNCS 1334, Beijing, China, November 11-14 1997, pp.223-232. (SCI-E, IF:0.515) (Note : See also Manik Lal Das's Paper, "Algorithms and Approaches of Proxy Signature: A Survey", and Zhengjun Cao's paper, "Classification of Signature-Only Signature Models".)
  80. [IC] Boyoung Lee, Seungjoo Kim and Dongho Won, "ID-Based Multisignature Scheme based on the High Residuosity Problem", Proc. of JW-ISC'97, Korea-Japan Joint Workshop on Information Security and Cryptology, Seoul, Korea, October 26-28 1997, pp.227-230.
  81. [IC] Seungjoo Kim, Sangjoon Park and Dongho Won, "Group Signatures for Hierarchical Multigroups", Okamoto, Davida, Mambo (Eds.): Proc. of ISW'97, Information Security Workshop, Springer-Verlag, LNCS 1396, Tatsunokuchi, Ishikawa Japan, September 17-19 1997, pp.273-281. (SCI-E, IF:0.515)
  82. [IC] Youngchul Choi, Seungjoo Kim, and Dongho Won, "The Problem of Single Term Off-Line Coins and the Countermeasures", Zensho Nakao and Yen-Wei Chen (Eds.): Proc. of ITC-CSCC'97, International Technical Conference on Circuits/Systems, Computers and Communications, Vol.I, Okinawa, Japan, July 14-16 1997, pp.587-590.
  83. [IC] Seungjoo Kim, Sungjun Park and Dongho Won, "Convertible Group Signatures", Kim, Matsumoto (Eds.): Advanced in Cryptology - The 5th AsiaCrypt'96, Springer-Verlag, LNCS 1163, Kyongju, Korea, November 3-7 1996, pp.311-321. (SCI-E) (Note : Sangjoon Park pointed out some weaknesses in Sungjun Park's group signature schemes of JW-ISC'95 and ICEIC'95, after the authors had sent the camera-ready manuscript for the 5th Asiacrypt'96 conference (so, we had no time to fix it up). Because our schemes are based on previous works of Sungjun Park, unfortunately, our proposed schemes are also vulnerable to Sangjoon Park's attack.)
  84. [IC] Seungjoo Kim, Sungjun Park and Dongho Won, "Zero-Knowledge Nominative Signatures" (revised 19th November 1998), Jiri Pribyl (Eds.): Proc. of PragoCrypt'96, International Conference on the Theory and Applications of Cryptology, Czech, Prague, September 30 - October 3, 1996, pp.380-392 ; Proceedings published by CTU(Czech Technical University) PUBLISHING HOUSE ISBN 80-01-01502-5.
  85. [IC] Yeonyi Choi, Seungjoo Kim, Sungjun Park and Dongho Won, "`Paradoxical' ID-Based Key Distribution Protocol for Mobile Communication Systems", Proc. of MDMC'96, International Workshop on Multi-Dimensional Mobile Communications, Seoul, Korea, July 18-20 1996, pp.412-415.
  86. [IC] Seungjoo Kim, Sungjun Park and Dongho Won, "Nominative Signature", Proc. of ICEIC'95, International Conference on Electronics, Informations and Communications, Yanji, Jilin, China, August 7-12 1995, pp.II-68 ~ II-71.

  87. [DJ] Mijin Kim, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "An Efficient and Secure Authentication Scheme Preserving User Anonymity", Journal of the KSDIM (Korea Society of Digital Industry and Information Management), Vol.6/No.3, September 2010, pp.69-77.
  88. [DJ] Yuna Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, and Seungjoo Kim, "A Proposal of Appropriate Device Authentication Scheme based PKI for Exchangeable CAS (XCAS)", The Transactions of the KIPS (Korea Information Processing Society), Vol.17-C/No.4, August 2010, pp.347-360.
  89. [DJ] Songyi Kim, Kwangwoo Lee, Hanjae Jeong, Youngjun Cho, Wookjae Cha, Seungjoo Kim, Dongho Won, "A Key Management Scheme for Radio Frequency Communication Environment", The Transactions of the KIPS (Korea Information Processing Society), Vol.16-C/No.4, August 2009, pp.439-448.
  90. [DJ] Donghyun Choi, Sungjin Lee, Hanjae Jeong, Dongjoo Kang, Hakman Kim, Kyungsin Kim, Dongho Won, and Seungjoo Kim, "Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications" The Transactions of the KIPS (Korea Information Processing Society), Vol.16-C/No.1, February 2009, pp.37-50.
  91. [DJ] Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, and Dongho Won, "A Secure License Sharing Scheme for Domain DRM System Against Replay Attack", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.1, February 2007, pp.97-102.
  92. [DJ] Jaeil Lee, Jongwook Park, Seungjoo Kim, and JooSeok Song, "Privacy-Enhanced Subject Identification method Embedded in X.509 Certificate", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.16/No.5, October 2006, pp.59-66. (Note : See also the IETF standard, "RFC 4683 : Internet X.509 Public Key Infrastructure Subject Identification Method (SIM)", October 10, 2006.)
  93. [DJ] Woosuk Chang, Hyunjue Kim, Junghyun Nam, Seokhyang Cho, Dongho Won, and Seungjoo Kim, "Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks", Journal of the IEEK (The Institute of Electrical and Communications Engineers of Korea), Vol.43TC/No.7, July 2006, pp.60-71.
  94. [DJ] Younggyo Lee, Junghyun Nam, Jeeyeon Kim, Seungjoo Kim, and Dongho Won, "A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.15/No.4, August 2005, pp.83-92.
  95. [DJ] Junghyun Nam, Seungjoo Kim, Dongho Won, and Chungryong Jang, "Group Key Agreement Protocols for Combined Wired/Wireless Networks", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.30/No.6C, June 2005, pp.607-615.
  96. [DJ] Keunwoo Rhee, Jin Kwak, Soohyun Oh, Seungjoo Kim, and Dongho Won, "Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment", The Transactions of the KIPS (Korea Information Processing Society), Vol.12-C/No.3, June 2005, pp.309-316.
  97. [DJ] Hyunjue Kim, Seungjoo Kim, Dongho Won, and Woochul Han, "A Study on the Control of Conditional Access to Pay-TV in Satellite Digital Multimedia Broadcasting", Journal of The KSCI (Korea Society of Computer and Information), Vol.10/No.2, May 2005, pp.169-177.
  98. [DJ] Hyunjue Kim, Junghyun Nam, Seungjoo Kim, and Dongho Won, "A Study on Efficient Group Communication in The Integrated Multicasting Environment", Journal of The KSCI (Korea Society of Computer and Information), Vol.10/No.2, May 2005, pp.159-167.
  99. [DJ] Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won, Hye-Joo Lee, and Jinsoo Choi, "An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices", The Transactions of the KIPS (Korea Information Processing Society), Vol.12-C/No.2, April 2005, pp.157-168.
  100. [DJ] Junghyun Nam, Younggyo Lee, Seungjoo Kim, and Dongho Won, "Cryptanalysis of Bresson-Chevassut-Essiari-Pointcheval's Key Agreement Scheme for Low-Power Mobile Devices", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.15/No.1, February 2005, pp.67-76.
  101. [DJ] Hyunjue Kim, Junghyun Nam, Seungjoo Kim, and Dongho Won, "Two-Round ID-Based Group Key Agreement Fitted for Pay-TV System", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.15/No.1, February 2005, pp.41-56.
  102. [DJ] Jin Kwak, Soohyun Oh, Keunwoo Rhee, Seungjoo Kim, and Dongho Won, "Fair EPC System", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.30/No.1C, January 2005, pp.116-128.
  103. [DJ] Junghyun Nam, Jinwoo Lee, Sungduk Kim, Seungjoo Kim, and Dongho Won, "Provably-Secure and Communication-Efficient Protocol for Dynamic Group Key Exchange", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.14/No.4, August 2004, pp.163-181.
  104. [DJ] Keun-Ok Kim, Junghyun Nam, Seungjoo Kim and Dongho Won, "Dual Signature Scheme to Provide Efficient Message Decryption", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.13/No.5, October 2003, pp.129-136.
  105. [DJ] Taekyoung Kwon, Sookhyun Yang, Seungjoo Kim and Seongan Lim, "An Experimental Study on The Semi-Automated Formal Verification of Cryptographic Protocols", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.13/No.1, February 2003, pp.115-129.
  106. [DJ] Soohyun Oh, Seungjoo Kim and Dongho Won, "Efficient On-Line Secret Sharing Scheme Based on One-Way Hash Function", The Transactions of the KIPS (Korea Information Processing Society), Vol.7/No.10, October 2000, pp.3128-3137.
  107. [DJ] Youngchul Choi, Seungjoo Kim and Dongho Won, "Efficient Electronic Cash System Based on Randomized Blind Signature", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.24/No.3A, March 1999, pp.447-457.
  108. [DJ] Seungjoo Kim, Sangjoon Park, Hyungkyu Yang and Dongho Won, "A Study on The Proxy Signatures for Partial Delegation with Warrant", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.24/No.3A. March 1999, pp.439-446.
  109. [DJ] Sangjoon Park, Seungjoo Kim and Dongho Won, "On the Security of ID-Based Group Signature", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.8/No.3, September 1998, pp.27-37. (Note : The most group signatures are based on the ElGamal-type signature scheme. In 1997, we proposed the first ID-based group signature. However, Mao had a cryptanalysis of the scheme that the receiver (or any user) can identify the signer from the group signature. In this paper, we introduce our ID-based group signature and Mao's cryptanalysis, and propose an improved scheme that Mao's method can't be applied.)
  110. [DJ] Seungjoo Kim, Sangjoon Park and Dongho Won, "Proxy Signatures for Partial Delegation with Warrant and Threshold Delegation", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.8/No.2, June 1998, pp.81-92.
  111. [DJ] Seungjoo Kim, Kyungshin Kim and Dongho Won, "A Study on The Integrated Digital Signature System Based on Digital Signature Standards", The Transactions of the KIPS (Korea Information Processing Society), Vol.5/No.4, April 1998, pp.984-994.
  112. [DJ] Seungjoo Kim, Boyoung Lee and Dongho Won, "A Study on The Integrated Digital Signature System for Smart Card", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.22/No.4, April 1997, pp.870-879.
  113. [DJ] Seungjoo Kim, Sungjun Park and Dongho Won, "An Integrated System of Nominative Signatures and Undeniable Signatures", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.21/No.5, May 1996, pp.1266-1273.
  114. [DJ] Seungjoo Kim, Kyungshin Kim, Sungjun Park and Dongho Won, "Zero-Knowledge Nominative Signatures", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.6/No.1., March 1996, pp.15-24.

  115. [DC] Soohyun Oh, Seungjoo Kim and Dongho Won, "On the Security of Cryptographic Techniques based on D.L.P.", Proc. of KIPS'98, Korea Information Processing Society Fall Conference, Vol.5/No.2, 1998, pp.745-748.
  116. [DC] Seungjoo Kim, Sangjoon Park and Dongho Won, "Group Signatures with Observers (preliminary version)", Proc. of CISC'97, Conference on Information Security and Cryptology, Vol.7/No.1, 1997, pp.19-25.

  117. [TR] Junghyun Nam, Seungjoo Kim, and Dongho Won, "Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing", IACR Cryptology ePrint Archive: Report 2005/269, 14 Aug 2005.
  118. [TR] Junghyun Nam, Seungjoo Kim, and Dongho Won, "A Weakness in Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords", IACR Cryptology ePrint Archive: Report 2004/348, 7 Dec 2004.
  119. [TR] Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won, "Secure Group Communications over Combined Wired/Wireless Networks", IACR Cryptology ePrint Archive: Report 2004/260, 10 Oct 2004.
  120. [TR] Junghyun Nam, Seungjoo Kim, and Dongho Won, "A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme", IACR Cryptology ePrint Archive: Report 2004/257, 5 Oct 2004.
  121. [TR] Junghyun Nam, Seungjoo Kim, and Dongho Won, "Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices", IACR Cryptology ePrint Archive: Report 2004/251, 24 Sep 2004.
  122. [TR] Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won, "DDH-Based Group Key Agreement for Mobile Computing", IACR Cryptology ePrint Archive: Report 2004/127, 29 May 2004.
  123. [TR] Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won, "Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange", IACR Cryptology ePrint Archive: Report 2004/115, 17 May 2004.
  124. [TR] Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng, "Security Analysis of "Provably" Secure Cryptosystems under Strong Adaptive Chosen-Ciphertext Attack", Technical Report of IEICE, ISSN 0913-5685, ISEC2001-89, Vol.101, No.507, pp.17-24, December 2001.


Etc (e.g. Forensic, Usable Security, and so on)

  1. [IJ] Minsu Park, Heesoo Kang, Seungsoo Baek, and Seungjoo Kim, "Further Analysis on Smart TV Forensics", Journal of Internet Technology, Vol.?, No.?, December 2018, pp.?-?. (SCI-E, IF:1.930)
  2. [IJ] Kyungsuk Yi and Seungjoo Kim, "Practical Silicon-Surface-Protection Method using Metal Layer", Journal of Semiconductor Technology and Science, Vol.16, No.4, August 2016, pp.470-480. (SCI-E, SCOPUS, IF:0.515)
  3. [IJ] Byunghee Lee, Kyungho Son, Dongho Won, and Seungjoo Kim, "Secure Data Deletion for USB Flash Memory", Journal of Information Science and Engineering, Vol.27, No.3, May 2011, pp.933-952. (SCI-E, SCOPUS, IF:0.27)

  4. [IC] Chi-en (Ashley) Shen, Kyoung-ju Kwak, and Min-Chang Jang, "Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions", Black Hat Europe 2017, London, United Kingdom, December 4-7, 2017.
  5. [IC] Sangmin Lee, Minsu Park, and Seungjoo Kim, "LG vs. Samsung Smart TV: Which Is Better for Tracking You?", CODE BLUE 2017, Tokyo, Japan, November 7-10, 2017. (Note : Watch also this video)
  6. [IC] Seungjoo Kim, "Network Separation Policy in Korea", DCC 2017, Microsoft Digital Crimes Consortium 2017 Panel: "Going Offline - The Role of Network Separation in Government Civilian Networks" (Moderator: Kaja Ciglic, Microsoft, Panelists: Seungjoo Kim, Korea University; Ron Winward, Radware; and Erick Stephens, Microsoft), Honolulu, Hawaii, March 13-17, 2017.
  7. [IC] Seungjoo Kim, "How South Korea Invests in Human Capital for Cyber-Security", CODE BLUE 2015, Tokyo, Japan, October 28-29, 2015. (Note : Watch also this video)
  8. [IC] Soojin Yoon, Jeongeun Park, Changkuk Choi, Seungjoo Kim, "SHRT - New Method of URL Shortening Including Relative Word of Target URL", The 9th SOUPS 2013, The 9th Symposium on Usable Privacy and Security 2013, Posters, Newcastle, UK., July 24-26, 2013.
  9. [IC] Younsung Choi, Younggyo Lee, Junghyun Nam, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won, "A Recovery Method of the Deleted Certificate and the Private-Key Encryption Password using Commercial Forensic Tools", Proc. of APIS 2007, The 6th Asia Pacific International Symposium on Information Technology 2007, Kuala Lumpur, Malysia, January 20-23, 2007, pp.201-204.
  10. [IC] Yunho Lee, Heasuk Jo, Seungjoo Kim, and Dongho Won, "An Efficient Dispute Resolving Method for Digital Images", Proc. of IS 2006, International Workshop on Information Security (in conjunction with OTM 2006), Springer-Verlag, LNCS 4277, Montpellier, France, October 30 - November 1, 2006, pp.331-341. (Acceptance Ratio: 28.91%)
  11. [IC] Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won, and Hyungkyu Yang, "A Method for Deciding Quantization Steps in QIM Watermarking Schemes", Proc. of SecUbiq 2005, International Workshop on Security in Ubiquitous Computing Systems (in conjunction with EUC 2005), Springer-Verlag, LNCS 3823, Nagasaki, Japan, December 6-9, 2005, pp.965-975. (SCI-E, IF:0.402)

  12. [DJ]Ha-bin Yim, Huy-kang Kim, and Seungjoo Kim, "Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.27/No.6, December 2017, pp.1431-1439.
  13. [DJ] Kunwoong Moon and Seungjoo Kim, "Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.27/No.4, August 2017, pp.897-912.
  14. [DJ] Jinhyuk Lee and Seungjoo Kim, "Study on Privacy in the IPTV Broadcasting Service", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.26/No.3, June 2016, pp.701-712.
  15. [DJ] Chunghan Kim, Minsu Park and Seungjoo Kim, "Study on Usable Security of Facebook", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.26/No.1, February 2016, pp.285-296.
  16. [DJ] Heesoo Kang, Minsu Park, and Seungjoo Kim, "(The First Experimental) Study on Smart TV Forensics", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.24/No.5, October 2014, pp.851-860.
  17. [DJ] Sunmi Nam, Minsu Park, Kyungshin Kim, and Seungjoo Kim, "A Study on the Regulations and Market of Location Based Service (LBS)", Journal of the KSII (Journal of Korean Society for Internet Information), Vol.15/No.4, August 2014, pp.141-152.
  18. [DJ] Soojin Yoon, Jeongeun Park, Changkuk Choi, and Seungjoo Kim, "SHRT : New method of URL Shortening Including Relative Word of Target URL", The Journal of the KICS (Korean Institute of Communication Sciences), Vol.38B/No.6, June 2013, pp.473-484.
  19. [DJ] Younsung Choi, Younggyo Lee, Yunho Lee, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, and Dongho Won, "The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.17/No.1, February 2007, pp.41-55.
  20. [DJ] Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won, and Hyungkyu Yang, "A Study on Optimizing Quantization Steps for QIM Watermarking Schemes", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.16/No.1, February 2006, pp.45-54.

  21. [DC] Seungjoo Kim, (Keynote Speech) "Why (and How) We Should Move from Security to Dependability", The First KimchiCon, June 26, 2015.


Patents

  1. [IP] Seungjoo Kim et al., "Apparatus and Method for Inputting Graphical Password Using Wheel Interface in Embedded System", US 7,992,202 B2, August 2, 2011.
  2. [IP] Seungjoo Kim et al., "Verification Method for Operation of Encryption Apparatus and Its Application to Electronic Voting", US 7,882,038 B2, February 1, 2011.
  3. [IP] Seungjoo Kim et al., "System and Method for Detecting Exposure of OCSP Responder's Session Private Key", US 7,721,102 B2, May 18, 2010.

  4. [DP] Seungjoo Kim et al., "Integrated Circuit Chip for Prevention Reverse Engineering", KR 10-2016-0084835 (Application No.), July 5, 2017.
  5. [DP] Seungjoo Kim et al., "Device for Detecting Offensive Driving", KR 10-2017-0065036 (Application No.), May 26, 2017.
  6. [DP] Seungjoo Kim et al., "Suspected Malignant Website Detecting Method and System Using Information Entropy", KR 10-1526500, June 1, 2015.
  7. [DP] Seungjoo Kim et al., "Method for Data Security Using Secret Sharing System in Cloud Environments", KR 10-1472320, December 8, 2014.
  8. [DP] Seungjoo Kim et al., "System for Generating Shorten Uniform Resource Locator and Method Therefor", KR 10-1441869, September 12, 2014.
  9. [DP] Seungjoo Kim et al., "A Flash Memory Control Device for Secure Deletion and the Method Thereof", KR 10-1231592, February 4, 2013.
  10. [DP] Seungjoo Kim et al., "A Code Encryption and Decryption Device against Reverse Engineering Based on Indexed Table and the Method Thereof", KR 10-1216995, December 24, 2012.
  11. [DP] Seungjoo Kim et al., "A Social Network Service System to Protect the Privacy of the Written by Updating Keys and the Method Thereof", KR 10-1216990, December 24, 2012.
  12. [DP] Seungjoo Kim et al., "A Hybrid Key Management Method for Robust SCADA Systems and the Session Key Generating Method Thereof", KR 10-1133262, March 28, 2012.
  13. [DP] Seungjoo Kim et al., "A Effective Key Management Method for Secure SCADA Communication", KR 10-1103033, December 29, 2011.
  14. [DP] Seungjoo Kim et al., "A Secure Multimedia E-Will Management System Based on the Certificate and the Method Thereof", KR 10-1093748, December 7, 2011.
  15. [DP] Seungjoo Kim et al., "A Secure E-Will Management System Based on the Certificate and the Method Thereof", KR 10-1077162, October 20, 2011.
  16. [DP] Seungjoo Kim et al., "A Effective Key Management Method for Secure SCADA Communication", KR 10-1062995, August 31, 2011.
  17. [DP] Seungjoo Kim et al., "An User-aware Home Network System Using the Cellular Phone and Method Thereof", KR 10-0980581, August 31, 2010.
  18. [DP] Seungjoo Kim et al., "Apparatus and Method for Generating One Time Password Using Sensor", KR 10-0980580, August 31, 2010.
  19. [DP] Seungjoo Kim et al., "A Password Authenticated Key Exchange Method Using the RSA", KR 10-0989185, October 14, 2010.
  20. [DP] Seungjoo Kim et al., "A Graphical Password Input System Using Wheel Interface and the Method Thereof", KR 10-0958440, May 10, 2010.
  21. [DP] Seungjoo Kim et al., "Encrypting Method for ID of RFID Tag, Authenticating Method of RFID Tag and RFID Authenticating System Using the Same", KR 10-0951527, March 30, 2010.
  22. [DP] Seungjoo Kim et al., "Graphic Key Pad, Method for Changing Key Arrangement of Graphic Key Pad, and Method for Password Authentication Using the Graphic Key Pad", KR 10-0945370, February 24, 2010.
  23. [DP] Seungjoo Kim et al., "A Graphical Password Input System and Method for Embedded Systems by Using Wheel Interface", KR 10-0933679, December 16, 2009.
  24. [DP] Seungjoo Kim et al., "A Verification Method for Operation of Encryption Apparatus and Its Application to Electronic Voting", KR 10-0856007, August 27, 2008.
  25. [DP] Seungjoo Kim et al., "Encryption/Decryption System of AD DRM License and Method Thereof", KR 10-0850929, August 1, 2008.
  26. [DP] Seungjoo Kim et al., "Privacy Management System of Tag and Their Methods", KR 10-0741702, July 16, 2007.
  27. [DP] Seungjoo Kim et al., "System and Method for Detecting the Exposure of OCSP Responder's Session Private Key", KR 10-0684079, February 12., 2007.
  28. [DP] Seungjoo Kim et al., "Method for Generating Session Keys for Low-Power Mobile Devices", KR 10-0667213, January 4, 2007.
  29. [DP] Seungjoo Kim et al., "Authorization Method in Radio Frequency Identification System", KR 10-0605138, July 19, 2006.
  30. [DP] Seungjoo Kim et al., "Method Generating Session Key For Group CommunicationIn Mobile Environment", KR 10-0588302, June 2, 2006.
  31. [DP] Seungjoo Kim et al., "Key Distributing Method Based On Personal Identification Information Having Self-Acknowledgement Characteristics", KR 10-0175616, November 10, 1998.