D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 42 Citations 8,514 275 World Ranking 5218 National Ranking 37

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • Operating system

His primary areas of investigation include Computer security, Cryptography, Public-key cryptography, Computer network and Encryption. His Computer security research incorporates themes from Signature and Internet privacy. His Cryptography research is multidisciplinary, incorporating elements of Digital signature, Mobile agent, Reverse proxy, Construct and Key.

His Computer network study integrates concerns from other disciplines, such as Distributed computing and Botnet. His work deals with themes such as Payload, Transmission Control Protocol, Network packet, User Datagram Protocol and Intrusion detection system, which intersect with Encryption. His studies in ID-based cryptography integrate themes in fields like ElGamal signature scheme and Schnorr signature.

His most cited work include:

  • ID-Based Blind Signature and Ring Signature from Pairings (446 citations)
  • Strong Proxy Signature and its Applications (263 citations)
  • Efficient ID-based blind signature and proxy signature from bilinear pairings (241 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Computer network, Authentication, Key and Public-key cryptography. The Computer security study combines topics in areas such as Protocol and Internet privacy. His biological study spans a wide range of topics, including Ubiquitous computing and Access control.

His research in Key intersects with topics in Cryptosystem and Hash function. His work in Public-key cryptography addresses subjects such as Signature, which are connected to disciplines such as Schnorr signature. His Cryptography study which covers Digital signature that intersects with Theoretical computer science.

He most often published in these fields:

  • Computer security (45.36%)
  • Computer network (22.86%)
  • Authentication (14.29%)

What were the highlights of his more recent work (between 2014-2020)?

  • Artificial intelligence (7.50%)
  • Deep learning (4.29%)
  • Computer network (22.86%)

In recent papers he was focusing on the following fields of study:

Artificial intelligence, Deep learning, Computer network, Machine learning and Intrusion detection system are his primary areas of study. His research in Artificial intelligence tackles topics such as Pattern recognition which are related to areas like Cluster analysis. Kwangjo Kim focuses mostly in the field of Computer network, narrowing it down to topics relating to Botnet and, in certain cases, Scalability, Adversarial machine learning and Semi-supervised learning.

Kwangjo Kim has researched Protocol in several fields, including Overhead, Embedded system, Trusted computing base and Public-key cryptography. His study on Blockchain is covered under Computer security. Many of his research projects under Computer security are closely connected to Conditional probability with Conditional probability, tying the diverse disciplines of science together.

Between 2014 and 2020, his most popular works were:

  • Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection (76 citations)
  • Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection (67 citations)
  • Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach (26 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • Operating system

Kwangjo Kim mainly investigates Artificial intelligence, Machine learning, Deep learning, Intrusion detection system and Computer network. His studies deal with areas such as Information retrieval and Pattern recognition as well as Artificial intelligence. His study in Deep learning is interdisciplinary in nature, drawing from both Artificial neural network and Homomorphic encryption.

In his study, which falls under the umbrella issue of Intrusion detection system, Natural language is strongly linked to Unsupervised learning. His study on Overhead is often connected to Trustworthiness as part of broader study in Computer network. His Data mining research is multidisciplinary, relying on both Computer security, Adversary, Private information retrieval and Location-based service.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

ID-Based Blind Signature and Ring Signature from Pairings

Fangguo Zhang;Kwangjo Kim.
international conference on the theory and application of cryptology and information security (2002)

757 Citations

Strong Proxy Signature and its Applications

Byoungcheon Lee;Heesun Kim;Kwangjo Kim.
(2000)

612 Citations

Efficient ID-based blind signature and proxy signature from bilinear pairings

Fangguo Zhang;Kwangjo Kim.
australasian conference on information security and privacy (2003)

409 Citations

Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and Cloning

Dang Nguyen Duc;Hyunrok Lee;Kwangjo Kim.
(2006)

373 Citations

Secure Mobile Agent Using Strong Non-designated Proxy Signature

Byoungcheon Lee;Heesun Kim;Kwangjo Kim.
australasian conference on information security and privacy (2001)

322 Citations

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

Qian Wang;Hai Su;Kui Ren;Kwangjo Kim.
international conference on computer communications (2011)

287 Citations

Advances in Cryptology — ASIACRYPT '96

Kwangjo Kim;Tsutomu Matsumoto.
(1996)

244 Citations

Mutual Authentication Protocol for Low-cost RFID

J Yang;J Park;H Lee;K Ren.
international cryptology conference (2005)

234 Citations

A novel privacy preserving authentication and access control scheme for pervasive computing environments

K. Ren;Wenjing Lou;Kwangjo Kim;R. Deng.
IEEE Transactions on Vehicular Technology (2006)

198 Citations

Hidden attribute-based signatures without anonymity revocation

Jin Li;Kwangjo Kim.
Information Sciences (2010)

187 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Kwangjo Kim

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 81

Yi Mu

Yi Mu

Fujian Normal University

Publications: 66

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 46

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 45

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 41

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 31

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 31

Fangguo Zhang

Fangguo Zhang

Sun Yat-sen University

Publications: 26

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 25

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 25

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 24

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 24

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 23

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 22

Kui Ren

Kui Ren

Zhejiang University

Publications: 21

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 20

Trending Scientists

Javier Romero

Javier Romero

Facebook (United States)

Jinxiang Chai

Jinxiang Chai

Texas A&M University

Nicolas Moës

Nicolas Moës

École Centrale de Nantes

Marcello Pinti

Marcello Pinti

University of Modena and Reggio Emilia

Tom P. Fleming

Tom P. Fleming

University of Southampton

David C. S. Huang

David C. S. Huang

Walter and Eliza Hall Institute of Medical Research

Thomas W. Dubensky

Thomas W. Dubensky

Tempest Therapeutics

Heiner Deubel

Heiner Deubel

Ludwig-Maximilians-Universität München

Linda J. Porrino

Linda J. Porrino

Wake Forest University

Renu B. Lal

Renu B. Lal

Centers for Disease Control and Prevention

Patricia van Oppen

Patricia van Oppen

Amsterdam UMC

Alain G. Bertoni

Alain G. Bertoni

Wake Forest University

Shoji Nakamori

Shoji Nakamori

Osaka University

Myron Schwartz

Myron Schwartz

Icahn School of Medicine at Mount Sinai

Marshall E. Kadin

Marshall E. Kadin

Brown University

Michael S. Kimmel

Michael S. Kimmel

Stony Brook University

Something went wrong. Please try again later.