D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 4,745 275 World Ranking 8873 National Ranking 89

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

Dongho Won mainly investigates Computer security, Password, Smart card, Computer network and Authentication protocol. His research related to Cryptography, Multi-factor authentication, Key, Challenge–response authentication and Session key might be considered part of Computer security. He focuses mostly in the field of Cryptography, narrowing it down to matters related to Public-key cryptography and, in some cases, Secret sharing and Proxy.

The concepts of his Key study are interwoven with issues in Distributed computing and Protocol. His Password research is multidisciplinary, incorporating elements of Authenticated Key Exchange and Authentication. His studies in Smart card integrate themes in fields like Scheme, Password authentication protocol and Wireless sensor network.

His most cited work include:

  • Proxy signatures, Revisited (381 citations)
  • Challenge-eesponse based RFID authentication protocol for distributed database environment (194 citations)
  • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. (135 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Computer network, Authentication, Password and Scheme. His Computer security study frequently draws connections between related disciplines such as Internet privacy. His Authentication study combines topics from a wide range of disciplines, such as Cryptography, Hash function, Anonymity, Authenticated Key Exchange and Mobile device.

His Cryptography research includes themes of Forward secrecy and Public-key cryptography. His work carried out in the field of Scheme brings together such families of science as User authentication and Biometrics. His study in Smart card is interdisciplinary in nature, drawing from both Password cracking, Cryptanalysis, Login and Mutual authentication.

He most often published in these fields:

  • Computer security (71.39%)
  • Computer network (28.37%)
  • Authentication (22.22%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (71.39%)
  • Smart card (15.84%)
  • Authentication (22.22%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Smart card, Authentication, Computer network and Scheme. Password, Anonymity, Password cracking, Session key and Biometrics are the primary areas of interest in his Computer security study. His Smart card study combines topics in areas such as Multi server, Cryptanalysis, Cryptography and Multi-factor authentication.

The Authentication study combines topics in areas such as Random oracle, Key and Mobile device. His Denial-of-service attack research extends to the thematically linked field of Computer network. In his research on the topic of Scheme, Factor is strongly related with User authentication.

Between 2014 and 2021, his most popular works were:

  • Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation (54 citations)
  • An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps (47 citations)
  • An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards. (30 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Dongho Won mostly deals with Computer security, Authentication, Password, Computer network and Session key. His work is dedicated to discovering how Computer security, Scheme are connected with Wireless network and other disciplines. In his work, Random oracle and Mobile device is strongly intertwined with Revocation, which is a subfield of Authentication.

His Password study integrates concerns from other disciplines, such as Roaming and Cryptography. His study explores the link between Computer network and topics such as Network Access Control that cross with problems in Quality of service and Network security. His study in Session key is interdisciplinary in nature, drawing from both Node, Denial-of-service attack and Biometrics.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Proxy signatures, Revisited

Seungjoo Kim;Sangjoon Park;Dongho Won.
international conference on information and communication security (1997)

754 Citations

Challenge-eesponse based RFID authentication protocol for distributed database environment

Keunwoo Rhee;Jin Kwak;Seungjoo Kim;Dongho Won.
international workshop on security (2005)

354 Citations

WIPI mobile platform with secure service for mobile RFID network environment

Namje Park;Jin Kwak;Seungjoo Kim;Dongho Won.
asia-pacific web conference (2006)

210 Citations

Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

Younsung Choi;Donghoon Lee;Jiye Kim;Jaewook Jung.
Sensors (2014)

188 Citations

Advanced Key-Management Architecture for Secure SCADA Communications

Donghyun Choi;Hakman Kim;Dongho Won;Seungjoo Kim.
IEEE Transactions on Power Delivery (2009)

128 Citations

Efficient Secure Group Communications for SCADA

Donghyun Choi;Sungjin Lee;Dongho Won;Seungjoo Kim.
IEEE Transactions on Power Delivery (2010)

98 Citations

Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

Jiye Kim;Donghoon Lee;Woongryul Jeon;Youngsook Lee.
Sensors (2014)

96 Citations

A practical analysis of smartphone security

Woongryul Jeon;Jeeyeon Kim;Youngsook Lee;Dongho Won.
international conference on human interface and management of information (2011)

89 Citations

Convertible Group Signatures

Seung Joo Kim;Sung Jun Park;Dong Ho Won.
international cryptology conference (1996)

88 Citations

Security Requirements of a Mobile Device Management System

Keunwoo Rhee;Woongryul Jeon;Dongho Won.
(2012)

86 Citations

Best Scientists Citing Dongho Won

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 32

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 30

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 26

Xiong Li

Xiong Li

University of Electronic Science and Technology of China

Publications: 25

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 24

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 19

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 18

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 17

Yi Mu

Yi Mu

Fujian Normal University

Publications: 16

Debiao He

Debiao He

Wuhan University

Publications: 15

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 15

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 14

Christian Rathgeb

Christian Rathgeb

Darmstadt University of Applied Sciences

Publications: 14

Andreas Uhl

Andreas Uhl

University of Salzburg

Publications: 14

Hung-Min Sun

Hung-Min Sun

National Tsing Hua University

Publications: 12

Tzonelih Hwang

Tzonelih Hwang

National Cheng Kung University

Publications: 12

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.