Dongho WON


Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks
Donghoon LEE Jaewook JUNG Younsung CHOI Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/12/01
Vol. E99-A  No. 12  pp. 2585-2590
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
return-oriented programmingexploit codemalware defensesoftware security
 Summary | Full Text:PDF(828.6KB)

API-Based Software Birthmarking Method Using Fuzzy Hashing
Donghoon LEE Dongwoo KANG Younsung CHOI Jiye KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/07/01
Vol. E99-D  No. 7  pp. 1836-1851
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software birthmarkbirthmarking systemssoftware similarityfuzzy hashAPI-based sequences
 Summary | Full Text:PDF(1.2MB) | (Errata[Uploaded on July 19,2016])

Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/01/01
Vol. E98-B  No. 1  pp. 160-170
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationkey exchangeauthenticationanonymitycommunication binding property
 Summary | Full Text:PDF(762.6KB) | (Errata[Uploaded on May 15,2015])

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting
Junghyun NAM Kim-Kwang Raymond CHOO Juryon PAIK Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 424-427
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
securitythree-party key exchangepassword-only authenticated key exchange (PAKE)dictionary attackinsider attack
 Summary | Full Text:PDF(227KB)

An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
Woongryul JEON Jeeyeon KIM Junghyun NAM Youngsook LEE Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/07/01
Vol. E95-B  No. 7  pp. 2505-2508
Type of Manuscript:  LETTER
Category: Terrestrial Wireless Communication/Broadcasting Technologies
Keyword: 
wireless communicationanonymityuser authenticationpassword guessing attack
 Summary | Full Text:PDF(201.3KB)

A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/05/01
Vol. E95-B  No. 5  pp. 1819-1821
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationauthenticationanonymitytraceabilitysmart card
 Summary | Full Text:PDF(212.6KB)

Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange
Junghyun NAM Juryon PAIK Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2  pp. 865-868
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
group communicationgroup key exchangepasswordimplicit key authenticationkey confirmation
 Summary | Full Text:PDF(126.6KB)

Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards
Junghyun NAM Seungjoo KIM Sangjoon PARK Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 299-302
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
distributed systemauthentication schemepasswordsmart cardparallel session attackdenial of service attack
 Summary | Full Text:PDF(98.6KB)

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol
Yunho LEE Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/07/01
Vol. E89-A  No. 7  pp. 2084-2087
Type of Manuscript:  LETTER
Category: Digital Signal Processing
Keyword: 
fingerprintinganonymous buyer-seller protocolwatermarkingman-in-the-middle attack
 Summary | Full Text:PDF(274.1KB)

Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme
Junghyun NAM Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 213-218
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
conference key distributionimplicit key authenticationparallel session attack
 Summary | Full Text:PDF(259.5KB)

Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords
Junghyun NAM Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 209-212
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
three-party key agreementpasswordverifier
 Summary | Full Text:PDF(139KB)

On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
Seungjoo KIM Masahiro MAMBO Takeshi OKAMOTO Hiroki SHIZUYA Mitsuru TADA Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 231-238
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Okamoto-Tanaka key exchange schemeID-based schemeactive attackknown-key attackforward secrecy
 Summary | Full Text:PDF(288.5KB)