Dongho Won mainly investigates Computer security, Password, Smart card, Computer network and Authentication protocol. His research related to Cryptography, Multi-factor authentication, Key, Challenge–response authentication and Session key might be considered part of Computer security. He focuses mostly in the field of Cryptography, narrowing it down to matters related to Public-key cryptography and, in some cases, Secret sharing and Proxy.
The concepts of his Key study are interwoven with issues in Distributed computing and Protocol. His Password research is multidisciplinary, incorporating elements of Authenticated Key Exchange and Authentication. His studies in Smart card integrate themes in fields like Scheme, Password authentication protocol and Wireless sensor network.
His primary areas of investigation include Computer security, Computer network, Authentication, Password and Scheme. His Computer security study frequently draws connections between related disciplines such as Internet privacy. His Authentication study combines topics from a wide range of disciplines, such as Cryptography, Hash function, Anonymity, Authenticated Key Exchange and Mobile device.
His Cryptography research includes themes of Forward secrecy and Public-key cryptography. His work carried out in the field of Scheme brings together such families of science as User authentication and Biometrics. His study in Smart card is interdisciplinary in nature, drawing from both Password cracking, Cryptanalysis, Login and Mutual authentication.
His primary scientific interests are in Computer security, Smart card, Authentication, Computer network and Scheme. Password, Anonymity, Password cracking, Session key and Biometrics are the primary areas of interest in his Computer security study. His Smart card study combines topics in areas such as Multi server, Cryptanalysis, Cryptography and Multi-factor authentication.
The Authentication study combines topics in areas such as Random oracle, Key and Mobile device. His Denial-of-service attack research extends to the thematically linked field of Computer network. In his research on the topic of Scheme, Factor is strongly related with User authentication.
Dongho Won mostly deals with Computer security, Authentication, Password, Computer network and Session key. His work is dedicated to discovering how Computer security, Scheme are connected with Wireless network and other disciplines. In his work, Random oracle and Mobile device is strongly intertwined with Revocation, which is a subfield of Authentication.
His Password study integrates concerns from other disciplines, such as Roaming and Cryptography. His study explores the link between Computer network and topics such as Network Access Control that cross with problems in Quality of service and Network security. His study in Session key is interdisciplinary in nature, drawing from both Node, Denial-of-service attack and Biometrics.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Proxy signatures, Revisited
Seungjoo Kim;Sangjoon Park;Dongho Won.
international conference on information and communication security (1997)
Challenge-eesponse based RFID authentication protocol for distributed database environment
Keunwoo Rhee;Jin Kwak;Seungjoo Kim;Dongho Won.
international workshop on security (2005)
WIPI mobile platform with secure service for mobile RFID network environment
Namje Park;Jin Kwak;Seungjoo Kim;Dongho Won.
asia-pacific web conference (2006)
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.
Younsung Choi;Donghoon Lee;Jiye Kim;Jaewook Jung.
Advanced Key-Management Architecture for Secure SCADA Communications
Donghyun Choi;Hakman Kim;Dongho Won;Seungjoo Kim.
IEEE Transactions on Power Delivery (2009)
Efficient Secure Group Communications for SCADA
Donghyun Choi;Sungjin Lee;Dongho Won;Seungjoo Kim.
IEEE Transactions on Power Delivery (2010)
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.
Jiye Kim;Donghoon Lee;Woongryul Jeon;Youngsook Lee.
A practical analysis of smartphone security
Woongryul Jeon;Jeeyeon Kim;Youngsook Lee;Dongho Won.
international conference on human interface and management of information (2011)
Convertible Group Signatures
Seung Joo Kim;Sung Jun Park;Dong Ho Won.
international cryptology conference (1996)
Security Requirements of a Mobile Device Management System
Keunwoo Rhee;Woongryul Jeon;Dongho Won.
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: