Researcher Page

사진

Kim, Kwangjo (김광조) C-1741-2011

Department
School of Computing(전산학부)
Co-author
Collaboration Network Collaboration Network
Website
http://caislab.kaist.ac.kr/kkjHomePage
Research Area
Authentication, Network Security, Industrial Security, SCADA security

Keyword Cloud

Reload 더보기
1

Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; Kim, KwangjoresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01

2

Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

Omar Y. Al-Jarrah; Omar Alhussein; Paul D. Yoo; Sami Muhaidat; Taha, K.; Kim, KwangjoresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08

3

Differentially private client-side data deduplication protocol for cloud storage services

Shin, Youngjoo; Kim, KwangjoresearcherWILEY-BLACKWELLSECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

4

Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework

Huseynov, Khalid; Yoo, Paul D.; 김광조researcher한국정보보호학회정보보호학회논문지, v.25, no.4, pp.807 - 816, 2015-08

5

조직의 실시간 보안관리 체계 확립을 위한 ‘인터페이스 보안’ 강화에 대한 연구

박준정; 김소라; 안수현; 임채호; 김광조researcher한국정보처리학회정보처리학회논문지. 컴퓨터 및 통신시스템, v.4, no.5, pp.171 - 176, 2015-05

6

Identity-based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, KwangjoresearcherELSEVIER SCIENCE INCINFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

7

escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구

김광조researcher; 이동수한국정보보호학회한국정보보호학회지, v.24, no.2, pp.7 - 20, 2014-04

8

Efficient and Secure File Deduplication in Cloud Storage

Shin, Youngjoo; Kim, KwangjoresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

9

A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks

Kim, Jang-Seong; Kim, Kwang-JoresearcherSPRINGERTELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1377 - 1388, 2013-02

10

Generic security-amplifying methods of ordinary digital signatures

Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjoresearcher; Wong, Duncan S.ELSEVIER SCIENCE INCINFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10

11

Resuscitating privacy-preserving mobile payment with customer in complete control

Konidala, Divyan Munirathnam; Dwijaksara, Made Harta; Kim, Kwangjoresearcher; Lee, DongManresearcher; Lee, Byung Cheon; Kim, Daeyoungresearcher; Kim, SoontaeresearcherSPRINGER LONDON LTDPERSONAL AND UBIQUITOUS COMPUTING, v.16, no.6, pp.643 - 654, 2012-08

12

Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Han, Kyusuk; Kim, Kwangjoresearcher; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, TaeshikOLD CITY PUBLISHING INCAD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

13

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment

Kim, Jang-Seong; Kim, Kwang-Joresearcher; Park, Jong-Hyuk; Shon, Tae-ShikPERGAMON-ELSEVIER SCIENCE LTDMATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.45 - 57, 2012-01

14

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

Han, Kyusuk; Shon, Taeshik; Kim, KwangjoresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.8, pp.2235 - 2238, 2011-08

15

Discrete logarithm based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Kim, KwangjoresearcherPERGAMON-ELSEVIER SCIENCE LTDCOMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623, 2011-07

16

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

Han, Kyu-Suk; Kim, Kwang-Joresearcher; Shon, Tae-ShikIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E94D, no.6, pp.1181 - 1184, 2011-06

17

New receipt-free voting scheme using double-trapdoor commitment

Chen, Xiaofeng; Wu, Qianhong; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Lee, Byoung-Cheon; Lee, Hyun-Rok; Kim, Kwang-JoresearcherELSEVIER SCIENCE INCINFORMATION SCIENCES, v.181, no.8, pp.1493 - 1502, 2011-04

18

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Han, Kyusuk; Yeun, Chan Yeob; Shon, Taeshik; Park, Jonghyuk; Kim, KwangjoresearcherWILEY-BLACKWELLINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04

19

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment

Kim, Jang-Seong; Shon, Tae-Shik; Kim, Kwang-JoresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.3, pp.686 - 689, 2011-03

20

Defending RFID authentication protocols against DoS attacks

Dang Nguyen Duc; Kim, Kwang-JoresearcherELSEVIER SCIENCE BVCOMPUTER COMMUNICATIONS, v.34, no.3, pp.384 - 390, 2011-03

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0