Publications‎ > ‎Conferences‎ > ‎

International Conference


  • [65] Minsu Park, Heesoo Kang, Jaeki Kim, Seungjin Lee and Seungjoo Kim,
    "Developing a Protection Profile for Smart TV (.ppt)",
    Proc. of ICCC 2014, 15th International Common Criteria Conference, New Delhi, India, 
    September 9-11, 2014.
  • [64] Minsu Park, Sunghoon Kang and Seungjoo Kim,
    "A study on weakness and improvement of Cloud Shredder",
    ICTC 2013,  ICT Convergence 2013, Jeju, Korea, October 14-16, 2013.
  • [63] Jinseok Park and Seungjoo Kim,
    "How the CC Harmonizes with Secure Software Development Lifecycle (.ppt)",
    Proc. of ICCC 2013, 14th International Common Criteria Conference, Orlando, Florida, USA, September 10-12, 2013.
  • [62] Jeonghoon Han and Seungjoo Kim,
    "Problem and Improvement of the Composition Documents for Smart Card Composite Product Evaluations (.ppt)",
    Proc. of ICCC 2013, 14th International Common Criteria Conference, Orlando, Florida, USA, September 10-12, 2013.
  • [61] SeungJin (beist) and Seungjoo Kim,
    (Invited Paper) "Hacking, Surveiling and Deceiving Victims on Smart TV (.pdf)",
    EDSC 2013, Embedded Device Security Conference 2013, Seattle, WA, USA, August 14 - 15, 2013.
  • [60] SeungJin (beist) Lee and Seungjoo Kim,
    "Hacking, Surveilling, and Deceiving the Audience with Smart TV",
    Black Hat USA 2013, Las Vegas, Nevada, USA, July 27 - Aug 1, 2013.
  • [59] Soojin Yoon, Jeongeun Park, Changkuk Choi, Seungjoo Kim ,
    "SHRT - New method of URL shortening including relative word of target URL",
    SOUPS 2013, The Symposium on Usable Privacy and Security 2013, Posters, Newcastle, UK., July 24-26, 2013.
  • [58] SeungJin (beist) Lee and Seungjoo Kim,
    "Smart TV Security - #1984 in 21st century - (.pdf)",
    TROOPERS 2013, Heidelberg, Germany, March 11-15, 2013.
  • Note : Watch also this video.
  • [57] SeungJin (beist) Lee and Seungjoo Kim,
    "Smart TV Security - #1984 in 21st century - (.pdf)",
    CanSecWest 2013, CanSecWest Applied Security Conference 2013, Vancouver, British Columbia, Canada, March 6-8, 2013.
  • [56] Kyoungju Kwak, Kwangwoo Lee, Dongho Won and Seungjoo Kim,,
    "Analysis and Countermeasures of Security Vulnerability on Portal Sites (.pdf)",
    Proc. of ACM ICUIMC 2011, International Conference on Ubiquitous Information Management and Communication 2011, Suwon, Korea, February 21-23, 2011, pp.2-5.
  • [55] Seungjin Son, Kwangwoo Lee, Dongho Won and Seungjoo Kim,
    "u-Healthcare System Protecting Privacy based on Cloaker (.pdf)",
    Proc. of IEEE BIBM 2010, International Conference on Bioinformatics & Biomedicine 2010, Hong Kong, China, December 18-21, 2010, pp.417-423.
  • [54] Kwangwoo Lee, Dongho Won, and Seungjoo Kim,
    "A Practical Approach to a Secure E-Will System in the R.O.C. (.pdf)",
    Proc. of IEEE CUTE 2010, International Conference on Ubiquitous Information Technologies and Applications 2010, Sanya, China, December 16-18, 2010, pp.1-6.
  • [53] Mijin Kim, Seungjoo Kim, and Dongho Won,
    "An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity (.pdf)",
    Proc. of WISM 2010, International Conference on Web Information Systems and Mining 2010, Springer-Verlag, LNCS 6318,, Sanya, China, October 23-24, 2010, pp.244-253.
  • [52] Hyunjung Lee, Dongho Won and Seungjoo Kim,
    "Protection Profile for E-Certificate Issuance System (.ppt)",
    Proc. of ICCC 2010, 11th International Common Criteria Conference, on CD-ROM, Antalya, Turkey, September 21-23, 2010.
  • [51] Taehyun Kim, Dongho Won, Kwangwoo Lee, Hogab Kang, and Seungjoo Kim,
    "Automated DCI Compliance Test System for Digital Cinema Entities (.pdf)",
    Proc. of IEEE NCM 2010, International Conference on Networked Computing and Advanced Information Management 2010, Seoul, Korea, August 16-18, 2010, pp.434-439.
  • [50] Dongbum Lee, Kwangwoo Lee, Seungjoo Kim, Woong Go, Dongho Won, and Jin Kwak,
    "A Secure Key Management Scheme for Multi-Agent base Sensor Cloud Computing in Wireless Network",
    Proc. of JWIS 2010, The 5th Joint Workshop on Information Security 2010, South China Agricultural University, Guangzhou, P.R.China, August 05-06, 2010, pp.272-286.
  • [49] Heasuk Jo, Seungjoo Kim, and Dongho Won,
    "A Study on Comparative Analysis of the Information Security Management Systems (.pdf)",
    Proc. of ICCSA 2010, The International Conference on Computational Science and Its Applications 2010, Springer-Verlag, LNCS 6019, Fukuoka, Japan, March 23-26, 2010, pp.510-519. (SCOPUS)
  • [48] Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won and Seungjoo Kim,
    "A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS) (.pdf),"
    Proc. of ISPEC 2010, Information Security Practice and Experience Conference 2010, Springer-Verlag, LNCS 6047, Seoul, Korea, March 12-13, 2010, pp.217-228. (SCOPUS)
  • [47] Kwangwoo Lee, Yunho Lee, Dongho Won and Seungjoo Kim,
    "Protection Profile for Secure E-Voting Systems (.pdf)," (Best Paper Award)
    Proc. of ISPEC 2010, Information Security Practice and Experience Conference 2010, Springer-Verlag, LNCS 6047, Seoul, Korea, March 12-13, 2010, pp.386-397. (SCOPUS)
  • [46] Sangsik Lee, Donghyun Choi, Dongho Won, and Seungjoo Kim,
    "Security Analysis on Commercial Online Music Streaming Service and Countermeasures (.pdf)",
    Proc. of ICUIMC 2010, International Conference on Ubiquitous Information Management and Communication 2010, Suwon, Korea, January 14-15, 2010, pp.408-414.
  • [45] Mijin Kim, Byunghee Lee, Seungjoo Kim, Dongho Won,
    "Weaknesses and Improvements of Kuo-Lee's One-time Password Authentication Scheme (.pdf)",
    Proc. of FGCN/ACN 2009, International Conference on Future Generation Communication and Networking 2009, Springer-Verlag, Communications in Computer and Information Science 56, Jeju, Korea, December 10-12, 2009, pp.421-430.
  • [44] Hyunseung Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim,
    "Cryptanalysis of two-factor authenticated key exchange protocol in Public Wireless LANs (.pdf)",
    Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.194-197.
  • [43] Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim,
    "Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol (.pdf)",
    Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.190-193.
  • [42] Hyunsang Park, Kwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho Won,
    "Security Analysis on the Online Office and Proposal of the Evaluation Criteria (.pdf)",
    Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.198-204.
  • [41] Songyi kim, Kwangwoo Lee, Seungjoo Kim, Dongho Won,
    "Security Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and Its Improvement (.pdf)",
    Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.460-464.
  • [40] Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won, Seungjoo Kim,
    "A Practical approaches to Code Encryption Method against Reverse Engineering (.pdf)",
    Proc. of ICCNS 2009, International Conference on Computer Networks and Security 2009, Bali, Indonesia, November 25-27, 2009, pp.151-158.
  • [39] Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won,
    "Off-line Password-guessing Attack to Yang's and Huang's Authentication Schemes (.pdf)",
    Proc. of NCM 2009, International Joint Conference on INC, IMS and IDC 2009, Seoul, Korea, August 25-27, 2009, pp.618-621.
  • [38] Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won,
    "Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key (.pdf),"
    Proc. of ICCSA 2009, The International Conference on Computational Science and Its Applications 2009, Springer-Verlag, LNCS 5593, Yongin, Korea, June 29 - July 2, 2009, pp.204-211. (SCOPUS)
  • [37] Kwangwoo Lee, Yunho Lee, Seungjoo Kim, Dongho Won,
    "A Practical Approach to a Reliable Electronic Election (.pdf),"
    Proc. of ICCSA 2009, The International Conference on Computational Science and Its Applications 2009, Springer-Verlag, LNCS 5593, Yongin, Korea, June 29 - July 2, 2009, pp.191-203. (SCOPUS)
  • [36] Wansuck Yi, Seungjoo Kim, Dongho Won,
    "Smart card based AKE Protocol using Biometric Information in Pervasive Computing Environment (.pdf),"
    Proc. of ICCSA 2009, The International Conference on Computational Science and Its Applications 2009, Springer-Verlag, LNCS 5593, Yongin, Korea, June 29 - July 2, 2009, pp.182-190. (SCOPUS)
  • [35] Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won,
    "Security Specification for Conversion Technologies of Heterogeneous DRM Systems (.pdf),"
    Proc. of ISPEC 2009, Information Security Practice and Experience Conference 2009, Springer-Verlag, LNCS 5451, Xi'an, China, April 13-15, 2009, pp.159-170. (SCOPUS) (Acceptance Ratio: 23%)
  • [34] Yunyoung Lee, Soonhaeng Hur, Dongho Won, and Seungjoo Kim,
    "Cipher Suite Setting Problem of SSL Protocol and It's Solutions (.pdf),"
    Proc. of FINA 2009, The Fifth International Symposium on Frontiers of Information Systems and Network Applications 2009, Bradford, UK, May 26-29, 2009, pp.140-146. (Acceptance Ratio: ??%)
  • [33] Jeonghoon Han, Dongho Won and Seungjoo Kim,
    "New Identity Management Scheme and Its Formal Analysis (.pdf),"
    Proc. of WASET 2009, World Academy of Science, Engineering and Technology 2009, Volume 49, Dubai, United Arab Emirates, January 28-29, 2009, pp.617-623. (Acceptance Ratio: 25%)
  • [32] Sumin Hong, Woongryul Jeon, Seungjoo Kim, Dongho Won, and Choonsik Park
    "The Vulnerabilities analysis of Fuzzy Vault using Password (.pdf),"
    Proc. of BSBT 2008, The International Conference on Bio-Science and Bio-Technology 2008, IEEE Computer Society, Volume III, Hainan Island, China, December 13-15, 2008, pp.76-83. (Acceptance Ratio: 24%)
  • [31] Sungjin Lee, Donghyun Choi, Choonsik Park, and Seungjoo Kim,
    "An Efficient Key Management Scheme for Secure SCADA Communication (.pdf),"
    Proc. of ICPEPE 2008, International Conference on Power Electronics and Power Engineering 2008, Laval, France, November 21-23, 2008, pp.458-464. (Acceptance Ratio: 20%)
  • [30] Yunho Lee, Seungjoo Kim, and Dongho Won,
    "How to Trust DRE Voting Machines Preserving Voter Privacy (.pdf),"
    Proc. of IEEE ICEBE 2008, International Conference on e-Business Engineering 2008, IEEE Computer Society, Xi'AN, China, October 22-24, 2008, pp.302-307.
  • [29] Donghyun Choi, Sungkyu Cho, Dongho Won, and Seungjoo Kim,
    "Protection Profile for Connected Interoperable DRM Framework (.pdf),"
    Proc. of WISA 2008, International Workshop on Information Security Applications, Springer-Verlag, LNCS 5379, Jeju Island, Korea, September 23-25, 2008, pp.320-332.
    (SCOPUS) (Acceptance Ratio: 14.3%)
  • [28] Kwangwoo Lee, Yunho Lee, Woongryul Jeon, Dongho Won and Seungjoo Kim,
    "Protection Profile for E-Voting Systems (.ppt)",
    Proc. of ICCC 2008, 9th International Common Criteria Conference, on CD-ROM, Jeju, Korea, September 23-25, 2008.
  • [27] Namje Park, Dooho Choi, Seungjoo Kim, and Dongho Won,
    "Enforcing Security in Mobile RFID Networks: Multilateral Approaches and Solutions (.pdf),"
    Proc. of IEEE/IFIP NOMS 2008, The 11th IEEE/IFIP Network Operations & Management Symposium 2008, IEEE Computer Society, Salvador, Brazil, April 7-11, 2008, pp.999-1002.
  • [26] Hanjae Jeong, Younsung Choi, Woongryel Jeon, Fei Yang, Yunho Lee, Seungjoo Kim, and Dongho Won,
    "Vulnerability Analysis of Secure USB Flash Drives (.pdf),"
    Proc. of IEEE MTDT 2007, The 15th IEEE International Workshop on Memory Technology, Design and Testing 2007, IEEE Computer Society, Taipei, Taiwan., December 3-5, 2007, pp.61-64.
  • [25] Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim and Dongho Won,
    "Security Analysis on the Authentication Mechanisms of Korean Popular Messengers (.pdf)",
    Proc. of HCI International 2007, 12th International Conference on Human-Computer Interaction, Springer-Verlag, LNCS 4554, Beijing, P.R.China, July 22-27, 2007, pp.547-552.
  • [24] Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, and Dongho Won,
    "An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack (.pdf)",
    Proc. of ATC-07, The 4th International Conference on Autonomic and Trusted Computing, Springer-Verlag, LNCS 4610, Hong Kong, China, July 11-13, 2007, pp.135-145. (Acceptance Ratio: 24.6%)
  • [23] Namje Park, Seungjoo Kim, and Dongho Won,
    "Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network (.pdf),"
    Proc. of AWIC 2007, The 5th Atlantic Web Intelligence Conference, Springer-Verlag, Advances in Soft Computing 43, Fontainebleau, France, June 25-27, 2007, pp.278-283.
  • [22] Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won,
    "A Countermeasure of Fake Root Key Installation using One-Time Hash Chain (.pdf)",
    Proc. of KES AMSTA 2007, KES Symposium on Agent and Multi-Agent Systems, Springer-Verlag, LNCS 4496, Wroclaw, Poland, May 31 - June 1, 2007, pp.1007-1016. (Acceptance Ratio: 25.86%)
  • [21] Hanjae Jeong, Kwangwoo Lee, Seungjoo Kim, and Dongho Won,
    "Analysis of Composed TOE in the Common Criteria 3.1",
    The First International Conference on Ubiquitous Information Management and Communication 2007, Suwon, Korea, February 8-9, 2007, pp.500-504.
  • [20] Yunyoung Lee, Donghwi Shin, Kwangwoo Lee, Seungjoo Kim, and Dongho Won,
    "The Threat Modeling and Choosing the Better Countermeasure",
    The First International Conference on Ubiquitous Information Management and Communication 2007, Suwon, Korea, February 8-9, 2007, pp.174-181.
  • [19] Sungjin Lee, Seokhyun Jang, Yongwook Kim, Donghyun Choi, Seungjoo Kim, and Dongho Won,
    "Mobile P2P Group Communication Protocol for Confidence and Anonymity",
    The First International Conference on Ubiquitous Information Management and Communication 2007, Suwon, Korea, February 8-9, 2007, pp.166-173.
  • [18] Sangjoon Park, Junghyun Nam, Seungjoo Kim and Dongho Won,
    "New Efficient Password-Authenticated Key Exchange Based on RSA (.pdf)",
    Proc. of CT-RSA 2007, Cryptographers' Track RSA Conference, Springer-Verlag, LNCS 4377, San Francisco, February 5-9, 2007, pp.309-323. (Acceptance Ratio: 34.24%)
  • [17] Younsung Choi, Younggyo Lee, Junghyun Nam, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won,
    "A Recovery Method of the Deleted Certificate and the Private-Key Encryption Password using Commercial Forensic Tools",
    Proc. of APIS 2007, The 6th Asia Pacific International Symposium on Information Technology 2007, Kuala Lumpur, Malysia, January 20-23, 2007, pp.201-204.
  • [16] Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, and Dongho Won,
    "Group Key Agreement Protocol Among Mobile Devices in Different Cells (.pdf)",
    Proc. of ISPA 2006 Ws, International Symposium on Parallel and Distributed Processing and Applications, Springer-Verlag, LNCS 4331, Sorrento, Italy, 1-4 December, 2006, pp.1090-1097. (Acceptance Ratio: 31.57%)
  • [15] Woosuk Chang, Hyunjue Kim, Junghyun Nam, Seokhyang Cho, Yunho Lee, Hogab Kang, Dongho Won, Seungjoo Kim,
    "New Pay-TV Conditional Access System Using A Group Key Agreement Protocol (.pdf)",
    Proc. of ICHIT 2006, International Conference on Hybrid Information Technology, Springer-Verlag, LNCS ????, Cheju Island, Korea, November 9-11, 2006, pp.?-?.
    (Acceptance Ratio: 20.84%)
  • [14] Keunwoo Rhee, Jin Kwak, Wansuk Lee, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won,
    "Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation (.pdf)",
    Proc. of ICHIT 2006, International Conference on Hybrid Information Technology, Springer-Verlag, LNAI 4413, Cheju Island, Korea, November 9-11, 2006, pp.607-616. (Acceptance Ratio: 20.84%)
  • [13] Yunho Lee, Heasuk Jo, Seungjoo Kim, and Dongho Won,
    "An Efficient Dispute Resolving Method for Digital Images (.pdf)",
    Proc. of IS 2006, International Workshop on Information Security (in conjunction with OTM 2006), Springer-Verlag, LNCS 4277, Montpellier, France, October 30 - November 1, 2006, pp.331-341. (Acceptance Ratio: 28.91%)
  • [12] Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho Won,
    "Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts",
    Proc. of WOTE 2006, IAVoSS Workshop On Trustworthy Elections (in conjunction with the 6th Workshop on Privacy Enhancing Technologies), Robinson College, Cambridge, United Kingdom, June 28-30, 2006, pp.145-152.
  • [11] Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won,
    "Dynamic Group Key Exchange over High Delay Networks",
    Proc. of ISPC COMM 2004, International Scientific-Practical Conference on Communication 2004, Issyk-Kul Lake, Kyrgyzstan, August 22-29, 2004, pp.262-267.
  • [10] Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, and Dongho Won,
    "Forward-secure commercial key escrow systems (.pdf)",
    Proc. of WET-ICE 2001 / Enterprise Security Workshop, IEEE 10th Intl. Workshop on Enabling Technologies : Infrastructure for Collaborative Enterprises, Massachusetts Institute of Technology, Cambridge, MA, USA, June 20-22, 2001, pp.211-216.
  • [9] Seungjoo Kim, Masahiro Mambo, Hiroki Shizuya and Dongho Won,
    "On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks (.ps.zip)",
    Proc. of JW-ISC'2000, Japan-Korea Joint Workshop on Information Security and Cryptology, Naha, Okinawa, Japan, January 25-26 2000, pp.191-198.
    • Note : See also helpful graphics from Hiroki Shizuya's web.
  • [8] Seungjoo Kim, Soohyun Oh, Sangjoon Park and Dongho Won,
    "Verifiable self-certified public keys (.ps.zip and .pdf.zip)",
    Daniel AUGOT and Claude CARLET (Eds.): Proc. of WCC'99, INRIA Workshop on Coding and Cryptography, Paris, France, January 11-14 1999, pp.139-148 ; Proceedings published by INRIA, France ISBN 2-7261-1136-X.
  • [7] Seungjoo Kim, Soohyun Oh, Kyungkug Kim and Dongho Won,
    "One-time self-certified public keys, revisited (.ps.zip and .pdf.zip)",
    Proc. of KIPS'98, Korea Information Processing Society Fall Conference, Vol.5/No.2, 1998, pp.745-748.
  • [6] Soohyun Oh, Seungjoo Kim, and Dongho Won,
    "On the Security of cryptographic techniques based on D.L.P. (.pdf)",
    Proc. of ICISC'98, International Conference on Information Security and Cryptology, Vol.1/No.1, Seoul, Korea, December 18-19 1998, pp.59-69 ; ISBN 89-85305-14-X.
  • [5] Boyoung Lee, Seungjoo Kim and Dongho Won,
    "  ID-based multisignature scheme based on the high residuosity problem",
    Proc. of JW-ISC'97, Korea-Japan Joint Workshop on Information Security and Cryptology, Seoul, Korea, October 26-28 1997, pp.227-230.
  • [4] Youngchul Choi, Seungjoo Kim, and Dongho Won,
    "The problem of single term off-line coins and the countermeasures",
    Zensho Nakao and Yen-Wei Chen (Eds.): Proc. of ITC-CSCC'97, International Technical Conference on Circuits/Systems, Computers and Communications, Vol.I, Okinawa, Japan, July 14-16 1997, pp.587-590.
  • [3] Seungjoo Kim, Sungjun Park and Dongho Won,
    "Zero-knowledge nominative signatures (.ps.zip)" (revised 19th November 1998),
    Jiri Pribyl (Eds.): Proc. of PragoCrypt'96, International Conference on the Theory and Applications of Cryptology, Czech, Prague, September 30 - October 3, 1996, pp.380-392 ; Proceedings published by CTU(Czech Technical University) PUBLISHING HOUSE ISBN 80-01-01502-5.
  • [2] Yeonyi Choi, Seungjoo Kim, Sungjun Park and Dongho Won,
    "`Paradoxical' ID-based key distribution protocol for mobile communication systems",
    Proc. of MDMC'96, International Workshop on Multi-Dimensional Mobile Communications, Seoul, Korea, July 18-20 1996, pp.412-415.
  • [1] Seungjoo Kim, Sungjun Park and Dongho Won,
    "Nominative signature",
    Proc. of ICEIC'95, International Conference on Electronics, Informations and Communications, Yanji, Jilin, China, August 7-12 1995, pp.II-68 ~ II-71.
Comments