His primary areas of investigation include Computer security, Cryptography, Public-key cryptography, Computer network and Encryption. His Computer security research incorporates themes from Signature and Internet privacy. His Cryptography research is multidisciplinary, incorporating elements of Digital signature, Mobile agent, Reverse proxy, Construct and Key.
His Computer network study integrates concerns from other disciplines, such as Distributed computing and Botnet. His work deals with themes such as Payload, Transmission Control Protocol, Network packet, User Datagram Protocol and Intrusion detection system, which intersect with Encryption. His studies in ID-based cryptography integrate themes in fields like ElGamal signature scheme and Schnorr signature.
His scientific interests lie mostly in Computer security, Computer network, Authentication, Key and Public-key cryptography. The Computer security study combines topics in areas such as Protocol and Internet privacy. His biological study spans a wide range of topics, including Ubiquitous computing and Access control.
His research in Key intersects with topics in Cryptosystem and Hash function. His work in Public-key cryptography addresses subjects such as Signature, which are connected to disciplines such as Schnorr signature. His Cryptography study which covers Digital signature that intersects with Theoretical computer science.
Artificial intelligence, Deep learning, Computer network, Machine learning and Intrusion detection system are his primary areas of study. His research in Artificial intelligence tackles topics such as Pattern recognition which are related to areas like Cluster analysis. Kwangjo Kim focuses mostly in the field of Computer network, narrowing it down to topics relating to Botnet and, in certain cases, Scalability, Adversarial machine learning and Semi-supervised learning.
Kwangjo Kim has researched Protocol in several fields, including Overhead, Embedded system, Trusted computing base and Public-key cryptography. His study on Blockchain is covered under Computer security. Many of his research projects under Computer security are closely connected to Conditional probability with Conditional probability, tying the diverse disciplines of science together.
Kwangjo Kim mainly investigates Artificial intelligence, Machine learning, Deep learning, Intrusion detection system and Computer network. His studies deal with areas such as Information retrieval and Pattern recognition as well as Artificial intelligence. His study in Deep learning is interdisciplinary in nature, drawing from both Artificial neural network and Homomorphic encryption.
In his study, which falls under the umbrella issue of Intrusion detection system, Natural language is strongly linked to Unsupervised learning. His study on Overhead is often connected to Trustworthiness as part of broader study in Computer network. His Data mining research is multidisciplinary, relying on both Computer security, Adversary, Private information retrieval and Location-based service.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
ID-Based Blind Signature and Ring Signature from Pairings
Fangguo Zhang;Kwangjo Kim.
international conference on the theory and application of cryptology and information security (2002)
Strong Proxy Signature and its Applications
Byoungcheon Lee;Heesun Kim;Kwangjo Kim.
(2000)
Efficient ID-based blind signature and proxy signature from bilinear pairings
Fangguo Zhang;Kwangjo Kim.
australasian conference on information security and privacy (2003)
Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and Cloning
Dang Nguyen Duc;Hyunrok Lee;Kwangjo Kim.
(2006)
Secure Mobile Agent Using Strong Non-designated Proxy Signature
Byoungcheon Lee;Heesun Kim;Kwangjo Kim.
australasian conference on information security and privacy (2001)
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Qian Wang;Hai Su;Kui Ren;Kwangjo Kim.
international conference on computer communications (2011)
Advances in Cryptology — ASIACRYPT '96
Kwangjo Kim;Tsutomu Matsumoto.
(1996)
Mutual Authentication Protocol for Low-cost RFID
J Yang;J Park;H Lee;K Ren.
international cryptology conference (2005)
A novel privacy preserving authentication and access control scheme for pervasive computing environments
K. Ren;Wenjing Lou;Kwangjo Kim;R. Deng.
IEEE Transactions on Vehicular Technology (2006)
Hidden attribute-based signatures without anonymity revocation
Jin Li;Kwangjo Kim.
Information Sciences (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Sun Yat-sen University
Xidian University
Chinese Academy of Sciences
Zhejiang University
University of Wollongong
Queensland University of Technology
City University of Hong Kong
Seoul National University of Science and Technology
Seoul National University
Chuo University
Facebook (United States)
Texas A&M University
École Centrale de Nantes
University of Modena and Reggio Emilia
University of Southampton
Walter and Eliza Hall Institute of Medical Research
Tempest Therapeutics
Ludwig-Maximilians-Universität München
Wake Forest University
Centers for Disease Control and Prevention
Amsterdam UMC
Wake Forest University
Osaka University
Icahn School of Medicine at Mount Sinai
Brown University
Stony Brook University