Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography Y Choi, D Lee, J Kim, J Jung, J Nam, D Won Sensors 14 (6), 10081-10106, 2014 | 241 | 2014 |
An off-line dictionary attack on a simple three-party key exchange protocol J Nam, J Paik, HK Kang, UM Kim, D Won IEEE Communications Letters 13 (3), 205-207, 2009 | 86 | 2009 |
Security weakness in a three-party pairing-based protocol for password authenticated key exchange J Nam, Y Lee, S Kim, D Won Information Sciences 177 (6), 1364-1375, 2007 | 84 | 2007 |
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation J Nam, KKR Choo, S Han, M Kim, J Paik, D Won Plos one 10 (4), e0116709, 2015 | 71 | 2015 |
DDH-based group key agreement in a mobile environment J Nam, J Lee, S Kim, D Won Journal of Systems and Software 78 (1), 73-83, 2005 | 68 | 2005 |
A provably-secure ECC-based authentication scheme for wireless sensor networks J Nam, M Kim, J Paik, Y Lee, D Won Sensors 14 (11), 21023-21044, 2014 | 61 | 2014 |
Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics Y Choi, J Nam, D Lee, J Kim, J Jung, D Won The Scientific World Journal 2014, 2014 | 60 | 2014 |
A weakness in the Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme for low-power mobile devices J Nam, S Kim, D Won IEEE Communications Letters 9 (5), 429-431, 2005 | 44 | 2005 |
Security analysis of a nonce-based user authentication scheme using smart cards NAM Junghyun, KIM Seungjoo, P Sangjoon, WON Dongho IEICE Transactions on Fundamentals of Electronics, Communications and …, 2007 | 35 | 2007 |
Simple and efficient group key agreement based on factoring J Nam, S Cho, S Kim, D Won Computational Science and Its Applications–ICCSA 2004: International …, 2004 | 34 | 2004 |
A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols KKR Choo, J Nam, D Won Information Sciences 281, 182-200, 2014 | 33 | 2014 |
Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks J Nam, J Paik, UM Kim, D Won IEEE Communications Letters 12 (2), 127-129, 2008 | 27 | 2008 |
An enhanced secure authentication scheme with anonymity for wireless environments J Woongryul, K Jeeyeon, N Junghyun, L Youngsook, W Dongho IEICE transactions on communications 95 (7), 2505-2508, 2012 | 26 | 2012 |
Cryptanalysis of a group key transfer protocol based on secret sharing J Nam, M Kim, J Paik, W Jeon, B Lee, D Won Future Generation Information Technology: Third International Conference …, 2011 | 26 | 2011 |
Dictionary attacks against password-based authenticated three-party key exchange protocols J Nam, KKR Choo, M Kim, J Paik, D Won KSII Transactions on Internet and Information Systems (TIIS) 7 (12), 3244-3260, 2013 | 25 | 2013 |
Secure group communications over combined wired and wireless networks J Nam, S Kim, D Won International Conference on Trust, Privacy and Security in Digital Business …, 2005 | 25 | 2005 |
A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol J Nam, J Paik, D Won Information Sciences 181 (1), 234-238, 2011 | 24 | 2011 |
Efficient password-authenticated key exchange based on RSA S Park, J Nam, S Kim, D Won Cryptographers’ Track at the RSA Conference, 309-323, 2007 | 24 | 2007 |
Password-only authenticated three-party key exchange with provable security in the standard model J Nam, KKR Choo, J Kim, HK Kang, J Kim, J Paik, D Won The Scientific World Journal 2014, 2014 | 20 | 2014 |
An efficient dynamic group key agreement for low-power mobile devices S Cho, J Nam, S Kim, D Won Computational Science and Its Applications–ICCSA 2005: International …, 2005 | 20 | 2005 |