Hong, Jaemin; Shim, Sunghwan; Park, Sanguk; Kim, Tae Woo; Kim, Jungwoo; Lee, Junsoo; Ryu, Sukyoung; Kang, Jeehoon, SCIENCE OF COMPUTER PROGRAMMING, v.238, 2024-12
Jeong, Hoyong; Chung, Kiwon; Hwang, Sung Ju; Son, Sooel, COMPUTERS SECURITY, v.144, 2024-09
Jung, Gyuwon; Park, Sangjun; Ma, Eun-Yeol; Kim, Heeyoung; Lee, Uichin, ACM COMPUTING SURVEYS, v.56, no.9, 2024-09
Kim, Minsu; Hwang, Jinwoo; Heo, Guseul; Cho, Seiyeon; Mahajan, Divya; Park, Jongse, PROCEEDINGS OF THE VLDB ENDOWMENT, v.17, no.8, pp.1802 - 1815, 2024-08
HA, TAEWOOK; Kim, Myoung Ho, 정보과학회 컴퓨팅의 실제 논문지, v.30, no.8, pp.347 - 353, 2024-08
Yi, Shinyoung; Kim, Donggun; Na, Jiwoong; Tong, Xin; Kim, Min Hyuk, ACM Transactions on Graphics, v.43, no.4, 2024-07
Son, Sunmin; Jung, Jingun; Ham, Auejin; Lee, Geehyuk, INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, v.40, no.13, pp.3539 - 3551, 2024-07
Kim, Mincheul; Kwon, Youngsun; Lee, Sebin; Yoon, Sung-Eui, IEEE ROBOTICS AND AUTOMATION LETTERS, v.9, no.6, pp.5767 - 5774, 2024-06
Hwang, Soojin; Baek, Daehyeon; Park, Jongse; Huh, Jaehyuk, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.21, no.2, 2024-06
Lee, Juho; Choi, Jin Woo; Jo, Sung-Ho, IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, v.16, no.3, pp.923 - 934, 2024-06
Threshold password-based authentication using bilinear pairings Lee, Sangwon; Han, Kyusuk; Kang, Seok-kyu; Kim, Kwangjo; Ine, So Ran, PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3093, pp.350 - 363, 2004 |
Yet another forward secure signature from bilinear pairings Vo, Duc-Liem; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.441 - 455, 2006-02 |
Secure authenticated group key agreement protocol in the MANET environment Yeun C.Y.; Han K.; Vo D.L.; Kim, Kwangjo, INFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164, 2008-08 |
A test sequence selection method for statecharts Hong, HS; Kim, YG; Cha, SD; Bae, Doo-Hwan; Ural, H, SOFTWARE TESTING VERIFICATION RELIABILITY, v.10, no.4, pp.203 - 227, 2000-12 |
A cohesion measure for object-oriented classes Chae, HS; Kwon, Yong Rae; Bae, Doo-Hwan, SOFTWARE-PRACTICE EXPERIENCE, v.30, no.12, pp.1405 - 1431, 2000-10 |
Test cases generation from UML state diagrams Kim, Y.G.; Hong, H.S.; Bae, Doo-Hwan; Cha, Sungdeok, IEE PROCEEDINGS: SOFTWARE, v.146, no.4, pp.187 - 192, 1999-08 |
Software modeling and analysis using a hierarchical object-oriented Petri net Hong, JE; Bae, Doo-Hwan, INFORMATION SCIENCES, v.130, no.1-4, pp.133 - 164, 2000-12 |
OBJECT-ORIENTED DEVELOPMENT OF ARCHITECTURE TRANSPARENT SOFTWARE FOR DISTRIBUTED PARALLEL SYSTEMS YAU, SS; Bae, Doo-Hwan; CHIDAMBARAM, M, COMPUTER COMMUNICATIONS, v.16, no.5, pp.317 - 327, 1993-05 |
SOFTWARE-DESIGN METHODS FOR DISTRIBUTED COMPUTING SYSTEMS YAU, SS; JIA, XP; Bae, Doo-Hwan, COMPUTER COMMUNICATIONS, v.15, no.4, pp.213 - 224, 1992-05 |
Special issue: Computer Software & Applications Bae, Doo-Hwan, JOURNAL OF SYSTEMS AND SOFTWARE, v.76, no.1, pp.1 - 2, 2005-04 |
SoftPM: a software process management system reconciling formalism with easiness Min, SY; Lee, HD; Bae, Doo-Hwan, INFORMATION AND SOFTWARE TECHNOLOGY, v.42, no.1, pp.1 - 16, 2000-01 |
OBJECT-ORIENTED AND FUNCTIONAL SOFTWARE-DESIGN FOR DISTRIBUTED REAL-TIME SYSTEMS YAU, SS; Bae, Doo-Hwan, COMPUTER COMMUNICATIONS, v.17, no.10, pp.691 - 888, 1994-10 |
Receipt-free electronic auction schemes using homomorphic encryption Chen, Xiaofeng; Lee, Byoungcheon; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.259 - 273, 2004 |
An Efficient Tree-based Group Key Agreement using Bilinear Map Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, Lecture Notes in Computer Science, Vol.2846, pp.357-371, 2003 |
Practical convertible authenticated encryption schemes using self-certified public keys Lv, Jiqiang; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.169, pp.1285 - 1297, 2005-10 |
Security of a multisignature scheme for specified group of verifiers Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07 |
An approach to specifying concurrent, distributed, and autonomous object behaviors using a high-level meta-object protocol Lee, JS; Bae, Doo-Hwan, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E83B, no.5, pp.999 - 1012, 2000-05 |
PROOF - A PARALLEL OBJECT-ORIENTED FUNCTIONAL COMPUTATION MODEL YAU, SS; JIA, XO; Bae, Doo-Hwan, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.12, no.3, pp.202 - 212, 1991-07 |
Remarks on the unknown key share attacks Baek, Joonsang; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E83A, no.12, pp.2766 - 2769, 2000-12 |
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings Vo, Duc-Liem; Lee, Hyun-Rok; Yeun, Chan-Yeob; Kim, Kwang-Jo, COMPUTERS & ELECTRICAL ENGINEERING, v.36, pp.155 - 159, 2010-01 |
Discover