- An Enhanced Remote User Authentication Scheme Using Smart Card, Jaewook Jung, Woongryul Jeon, Dongho Won, ICUIMC 2014.
- Password-Based Single-File Encryption and Secure Data Deletion for Solid-State Drive, Younsung Choi, Donghoon Lee, Woongryul Jeon, Dongho Won, ICUIMC 2014.
- A Secure User-friendly Authentication Scheme with Anonymity for Wireless Communications, Woongryul Jeon,Yunho Lee,Dongho Won, ICUIMC 2013.
- Key Management Scheme using Dynamic Identity-Based Broadcast Encryption for Social Network Services, Youngman Jung, Yoonho Nam, Jiye Kim, Woongryul Jeon, Hanwook Lee, Dongho Won, CSA 13 (LNEE 279), pp.435-443.
- An Improvement of Secure Remote User Authentication Scheme Using Smart Cards, Jongho Mun, Qiuyan Jin, Woongryul Jeon, and Dongho Won, ICITCS 2013, pp.1-4.
- Fingerprint-based User Authentication Scheme for Home Healthcare system, Qiuyan Jin, Woongryul Jeon, Changwhan Lee, Youngchul Choi, Dongho Won, ICUFN 2013, pp.178-183.
- Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card, Jongho Mun, Jiye Kim, Woongryul Jeon, Youngsook Lee, Dongho Won, CSA 13 (LNEE 279), pp.391-404.
- A Design of Real-time Restriction System based on User’s Behavior in the Online Game, Donghoon Lee, Woongryul Jeon, Hanwook Lee, and Dongho Won, RNIS 2013, pp.352-354.
- Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity, Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, and Dongho Won, STA 2012 (LNEE 180), pp.225-231.
- An Efficient User Authentication Scheme for Wireless Communications, Woongryul Jeon, Kwangwoo Lee, Byunghee Lee, Yunho Lee, Dongho Won, ASP 2012, pp.87-87.
- Design of a Simple User Authentication Scheme Using OR-Code for Mobile Device, Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, and Dongho Won, STA 2012 (LNEE 180), pp.241-247.
- Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices, Junghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, Woongryul Jeon, Dongho Won, ISA 2012, pp.89-91.
- Cryptanalysis and Improvement of a Biometrics-Based Multi-Server Authentication with Key Agreement Scheme, Hakhyun Kim, Woongryul Jeon, Kwangwoo Lee, Yunho Lee, and Dongho Won, ICCSA 2012 (LNCS 7335), pp.18-21.
- Protection Profile for Mobile Device Management System, Keunwoo Rhee, Woongryul Jeon and Dongho Won, ISA 2012, pp.187-189.
- Analysis of Content Filtering Software, Woongryul Jeon, Youngsook Lee, Dongho Won, HCII 2011 (LNCS 6771), pp.548-557.
- An Improved User Authentication Scheme for Wireless Communications, Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, Dongho Won, ITCS 2011, pp.203-210.
- Cryptanalysis of Robust Multi-Server Authentication Scheme, Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won, CCSIE 2011, pp.216-219.
- Cryptanalysis of the user authentication scheme with anonymity, Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho Won, FGIT 2011 (LNCS 7105), pp.285-292.
- A Mobile based Anti-Phishing Authentication Scheme using QR code, Kyeongwon Choi, Changbin Lee, Woongryul Jeon, Kwangwoo Lee and Dongho Won, ICMIC 2011, pp.109-113.
- A Practical Analysis of Smartphone Security, Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won, HCII 2011 (LNCS 6771), pp.311-320.
- Security Specification for Conversion Technologies of Heterogeneous DRM Systems, Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim and Dongho Won, ISPEC 2009 (LNCS 5451), pp.159-170.
- Protection Profile for E-voting systems, Kwangwoo Lee, Yunho Lee, Woongryul Jeon, Dongho Won and Seungjoo Kim, ICCC 2008, pp.23-25.
- The Vulnerabilities analysis of Fuzzy Vault using Password, Sumin Hong, Woongryul Jeon, Seungjoo Kim and Dongho Won, BSBT 2008, pp.76-83.
- A Protection Profile for the Access Control Based Database Security System in Sniffing Mode, Woongryul Jeon, Haesuk Jo, Yunho Lee, Seungjoo Kim and Dongho Won, 2nd International Joint Workshop on Information Security and It's Applications, pp.150-160.
- Cleaning Policy for Secure Deletion of Data from Flash Memory in Momory in Mobile Phone, Woongryul Jeon, Haesuk Jo, Seungjoo Kim and Dongho Won, 2nd International Joint Workshop on Information Security and It's Applications, pp.251-255.