default search action
Junghyun Nam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Vanessa Tan, Junghyun Nam, Juhan Nam, Junyong Noh:
Motion to Dance Music Generation using Latent Diffusion Model. SIGGRAPH Asia Technical Communications 2023: 5:1-5:4 - 2021
- [j30]Junghyun Nam:
Understanding of the Quality of Computer-Mediated Communication Technology in the Context of Business Planning. Informing Sci. Int. J. an Emerg. Transdiscipl. 24: 111-127 (2021) - [c30]Junghyun Nam:
Determining the motivations to use Computer-Mediated Communication. CSCI 2021: 1449-1450
2010 – 2019
- 2016
- [j29]Junghyun Nam:
Influence of Information Product Quality on Informing Users: A Web Portal Context. Informing Sci. Int. J. an Emerg. Transdiscipl. 19: 381-409 (2016) - [j28]Hanwook Lee, Junghyun Nam, Moonseong Kim, Dongho Won:
Forward Anonymity-Preserving Secure Remote Authentication Scheme. KSII Trans. Internet Inf. Syst. 10(3): 1289-1310 (2016) - [j27]Wook Bahn, Junghyun Nam, Sang-Hoon Lee, Dong-Il Dan Cho:
Digital Optoelectrical Pulse Method for Vernier-Type Rotary Encoders. IEEE Trans. Instrum. Meas. 65(2): 431-440 (2016) - 2015
- [j26]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 424-427 (2015) - [j25]Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Juryon Paik, Dongho Won:
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting. Symmetry 7(1): 105-124 (2015) - [i15]Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Moonseong Kim, Juryon Paik, Dongho Won:
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. CoRR abs/1509.06813 (2015) - 2014
- [j24]Junghyun Nam:
Understanding the motivation to use web portals. Comput. Hum. Behav. 36: 263-273 (2014) - [j23]Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won:
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281: 182-200 (2014) - [j22]Jinsoo Kim, Myeong-Cheol Ko, Junghyun Nam, Junghwan Kim:
Bitmap-based Prefix Caching for Fast IP Lookup. KSII Trans. Internet Inf. Syst. 8(3): 873-889 (2014) - [j21]Juryon Paik, Junghyun Nam, Ung-Mo Kim, Dongho Won:
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data. J. Inf. Sci. Eng. 30(3): 787-817 (2014) - [j20]Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam, Dongho Won:
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 14(6): 10081-10106 (2014) - [j19]Juryon Paik, Junghyun Nam, Ung-Mo Kim, Dongho Won:
Association Rule Extraction from XML Stream Data for Wireless Sensor Networks. Sensors 14(7): 12937-12957 (2014) - [j18]Junghyun Nam, Moonseong Kim, Juryon Paik, Youngsook Lee, Dongho Won:
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks. Sensors 14(11): 21023-21044 (2014) - [i14]Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won:
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. IACR Cryptol. ePrint Arch. 2014: 358 (2014) - 2013
- [j17]Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik, Dongho Won:
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols. KSII Trans. Internet Inf. Syst. 7(12): 3244-3260 (2013) - [i13]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
On the security of a password-only authenticated three-party key exchange protocol. IACR Cryptol. ePrint Arch. 2013: 540 (2013) - [i12]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013: 666 (2013) - 2012
- [j16]Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, Dongho Won:
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments. IEICE Trans. Commun. 95-B(7): 2505-2508 (2012) - [j15]Junghyun Nam, Moonseong Kim, Juryon Paik, Dongho Won:
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment. KSII Trans. Internet Inf. Syst. 6(2): 751-765 (2012) - [j14]Junghyun Nam, Minkyu Park, Sangchul Han, Juryon Paik, Dongho Won:
Scalable Group Key Exchange for Securing Distributed Operating Systems. J. Inf. Sci. Eng. 28(5): 829-857 (2012) - 2011
- [j13]Junghyun Nam, Juryon Paik, Dongho Won:
Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 865-868 (2011) - [j12]Junghyun Nam, Juryon Paik, Dongho Won:
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol. Inf. Sci. 181(1): 234-238 (2011) - [c29]Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, Dongho Won:
Cryptanalysis of the User Authentication Scheme with Anonymity. FGIT 2011: 285-292 - [c28]Junghyun Nam, Moonseong Kim, Juryon Paik, Woongryul Jeon, Byunghee Lee, Dongho Won:
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing. FGIT 2011: 309-315 - [c27]Junghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, Dongho Won:
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group. HCI (11) 2011: 339-348 - [c26]Junghyun Nam, Kwang-Woo Lee, Juryon Paik, Woojin Paik, Dongho Won:
Security Improvement on a Group Key Exchange Protocol for Mobile Networks. ICCSA (4) 2011: 123-132 - [c25]Junghyun Nam, Juryon Paik, Byunghee Lee, Kwang-Woo Lee, Dongho Won:
An Improved Protocol for Server-Aided Authenticated Group Key Establishment. ICCSA (5) 2011: 437-446 - 2010
- [i11]Junghyun Nam:
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2010: 225 (2010)
2000 – 2009
- 2009
- [j11]Junghyun Nam, Juryon Paik, Hyun-Kyu Kang, Ung-Mo Kim, Dongho Won:
An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun. Lett. 13(3): 205-207 (2009) - [j10]Juryon Paik, Junghyun Nam, Dongho Won, Ung-Mo Kim:
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. J. Inf. Sci. Eng. 25(2): 435-464 (2009) - [c24]Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, Ung-Mo Kim:
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. ICCSA (2) 2009: 173-181 - [c23]Juryon Paik, Junghyun Nam, Wonyoung Kim, Joonsuk Ryu, Ung-Mo Kim:
Mining association rules in tree structured XML data. ICIS 2009: 807-811 - [c22]Junghyun Nam:
Web portal quality. SOLI 2009: 163-168 - 2008
- [j9]Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won:
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks. IEEE Commun. Lett. 12(2): 127-129 (2008) - [c21]Juryon Paik, Junghyun Nam, Jaegak Hwang, Ung-Mo Kim:
Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method. APWeb 2008: 93-98 - [c20]Juryon Paik, Junghyun Nam, Hee Yong Youn, Ung-Mo Kim:
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. ATC 2008: 264-278 - [c19]Junghyun Nam, Sunghoon Chun, Gibum Koo, Yanggi Kim, Byungsoo Moon, Jonghyoung Lim, Jaehoon Joo, Sangseok Kang, Hoonjung Kim, Kyeongseon Shin, Kisang Kang, Sungho Kang:
A New Wafer Level Latent Defect Screening Methodology for Highly Reliable DRAM Using a Response Surface Method. ITC 2008: 1-10 - [c18]Youngsook Lee, Junghyun Nam, Dongho Won:
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. KES-AMSTA 2008: 850-857 - [i10]Junghyun Nam:
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2008: 65 (2008) - 2007
- [j8]Junghyun Nam, Seungjoo Kim, Sangjoon Park, Dongho Won:
Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 299-302 (2007) - [j7]Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf. Sci. 177(6): 1364-1375 (2007) - [j6]Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won:
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. Inf. Sci. 177(23): 5441-5467 (2007) - [c17]Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won:
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. ACNS 2007: 158-176 - [c16]Juryon Paik, Joo Chang Lee, Junghyun Nam, Ung-Mo Kim:
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. CIS 2007: 209-213 - [c15]Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won:
Efficient Password-Authenticated Key Exchange Based on RSA. CT-RSA 2007: 309-323 - [c14]Juryon Paik, Junghyun Nam, Seung-Cheol Lee, Ung-Mo Kim:
A Framework for Data Structure-Guided Extraction of XML Association Rules. International Conference on Computational Science (3) 2007: 709-716 - [c13]Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won:
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. KES (1) 2007: 672-679 - [c12]Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won:
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. KES-AMSTA 2007: 616-625 - [i9]Junghyun Nam:
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. IACR Cryptol. ePrint Arch. 2007: 166 (2007) - 2006
- [j5]Junghyun Nam, Seungjoo Kim, Dongho Won:
Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 209-212 (2006) - [j4]Junghyun Nam, Seungjoo Kim, Dongho Won:
Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 213-218 (2006) - [j3]Junghyun Nam, Dongho Won:
Group key exchange over combined wired and wireless networks. J. Commun. Networks 8(4): 461-474 (2006) - [c11]Junghyun Nam, Roberta Lamb:
The News: Examining Perceptions of Information Product Quality (IPQ). AMCIS 2006: 58 - [c10]Youngsook Lee, Junghyun Nam, Dongho Won:
An Inter-domain Key Agreement Protocol Using Weak Passwords. ICCSA (3) 2006: 517-526 - [c9]Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won:
Two Efficient and Secure Authentication Schemes Using Smart Cards. ICCSA (5) 2006: 858-866 - [c8]Youngsook Lee, Junghyun Nam, Dongho Won:
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. OTM Workshops (1) 2006: 508-516 - [i8]Junghyun Nam, Youngsook Lee, Dongho Won:
Constant Round Group Key Exchange with Logarithmic Computational Complexity. IACR Cryptol. ePrint Arch. 2006: 284 (2006) - 2005
- [j2]Junghyun Nam, Seungjoo Kim, Dongho Won:
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices. IEEE Commun. Lett. 9(5): 429-431 (2005) - [j1]Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won:
DDH-based group key agreement in a mobile environment. J. Syst. Softw. 78(1): 73-83 (2005) - [c7]Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang:
Practical and Provably-Secure Multicasting over High-Delay Networks. International Conference on Computational Science (2) 2005: 493-501 - [c6]Seokhyang Cho, Junghyun Nam, Seungjoo Kim, Dongho Won:
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. ICCSA (1) 2005: 498-507 - [c5]Hyunjue Kim, Junghyun Nam, Seungjoo Kim, Dongho Won:
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. PCM (2) 2005: 117-128 - [c4]Junghyun Nam, Seungjoo Kim, Dongho Won:
Secure Group Communications over Combined Wired and Wireless Networks. TrustBus 2005: 90-99 - [c3]Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. WISA 2005: 1-9 - [i7]Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing. IACR Cryptol. ePrint Arch. 2005: 269 (2005) - 2004
- [c2]Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won:
Simple and Efficient Group Key Agreement Based on Factoring. ICCSA (1) 2004: 645-654 - [i6]Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won:
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange. IACR Cryptol. ePrint Arch. 2004: 115 (2004) - [i5]Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won:
DDH-based Group Key Agreement in a Mobile Environment. IACR Cryptol. ePrint Arch. 2004: 127 (2004) - [i4]Junghyun Nam, Seungjoo Kim, Dongho Won:
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices. IACR Cryptol. ePrint Arch. 2004: 251 (2004) - [i3]Junghyun Nam, Seungjoo Kim, Dongho Won:
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme. IACR Cryptol. ePrint Arch. 2004: 257 (2004) - [i2]Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won:
Secure Group Communications over Combined Wired/Wireless Networks. IACR Cryptol. ePrint Arch. 2004: 260 (2004) - [i1]Junghyun Nam, Seungjoo Kim, Dongho Won:
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords. IACR Cryptol. ePrint Arch. 2004: 348 (2004) - 2001
- [c1]Jong P. Yoon, Yixin Luo, Junghyun Nam:
Bitmap approach to trend clustering for prediction in time series databases. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2001: 302-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint