A mobile based anti-phishing authentication scheme using QR code K Choi, C Lee, W Jeon, K Lee, D Won Mobile IT Convergence (ICMIC), 2011 International Conference on, 109-113, 2011 | 70 | 2011 |
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme H Kim, W Jeon, K Lee, Y Lee, D Won International Conference on Computational Science and Its Applications, 391-406, 2012 | 69 | 2012 |
Construction of a secure two-factor user authentication system using fingerprint information and password W Go, K Lee, J Kwak Journal of Intelligent Manufacturing 25 (2), 217-230, 2014 | 30 | 2014 |
Protection profile for secure e-voting systems K Lee, Y Lee, D Won, S Kim International Conference on Information Security Practice and Experience …, 2010 | 20 | 2010 |
Verification method for operation of encryption apparatus and its application to electronic voting Y Lee, K Lee, S Kim, D Won US Patent 7,882,038, 2011 | 10 | 2011 |
Internet Based E-Will Management System Using Certificate and Method Thereof K Lee, D Won, S Kim US Patent App. 12/775,352, 2011 | 9 | 2011 |
A secure and efficient E-Will system based on PKI K Lee, D Won, S Kim Information 14 (7), 2187-2206, 2011 | 9 | 2011 |
Vulnerabilities Analysis of the OTP Implemented on a PC WC Hong, KW Lee, SJ Kim, DH Won The KIPS Transactions: PartC 17 (4), 361-370, 2010 | 9 | 2010 |
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System HJ Lee, K Lee, D Won Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 …, 2011 | 8 | 2011 |
Study on A secure remote user authentication scheme using smart cards J Qiuyan, K Lee, D Won International Journal of Security and Its Applications 7 (2), 105-116, 2013 | 6 | 2013 |
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard C Lee, S Park, K Lee, D Won International Conference on Hybrid Information Technology, 488-495, 2011 | 6 | 2011 |
Security analysis on anonymous mutual authentication protocol for RFID tag without back-end database and its improvement S Kim, K Lee, S Kim, D Won World Acad Sci Eng Technol, 460-464, 2009 | 6 | 2009 |
Cryptanalysis of a two-factor user authentication scheme over insecure channels J Qiuyan, K Lee, D Won ISA 2012, 2012 | 5 | 2012 |
Malware Variant Detection and Classification Using Control Flow Graph D Shin, K Lee, D Won International Conference on Hybrid Information Technology, 174-181, 2011 | 5 | 2011 |
An improved protocol for server-aided authenticated group key establishment J Nam, J Paik, B Lee, K Lee, D Won International Conference on Computational Science and Its Applications, 437-446, 2011 | 5 | 2011 |
Security improvement on a group key exchange protocol for mobile networks J Nam, K Lee, J Paik, W Paik, D Won International Conference on Computational Science and Its Applications, 123-132, 2011 | 5 | 2011 |
Efficient voter verifiable e-voting schemes with cryptographic receipts Y Lee, K Lee, S Kim, D Won Proc. of IAVoSS Workshop On Trustworthy Election (WOTE 2006), Cambridge …, 2006 | 5 | 2006 |
Cryptanalysis of a secure remote user authentication scheme J Qiuyan, KW Lee, DH Won The Journal of Korean Institute of Communications and Information Sciences …, 2012 | 4 | 2012 |
Enhanced code-signing scheme for smartphone applications I Jeun, K Lee, D Won International Conference on Future Generation Information Technology, 353-360, 2011 | 3 | 2011 |
Information technology security evaluation using CERT c secure coding standard T Lee, K Lee, D Won, N Park International Conference on Future Generation Information Technology, 335-342, 2011 | 3 | 2011 |