Kwangjo KIM


Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack
Yukou KOBAYASHI Naoto YANAI Kazuki YONEYAMA Takashi NISHIDE Goichiro HANAOKA Kwangjo KIM Eiji OKAMOTO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2991-3006
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password-based authenticated key exchange (PAKE)threshold cryptography
 Summary | Full Text:PDF(2.1MB) | (Errata[Uploaded on January 1,2018])

Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm
Muhamad Erza AMINANTO HakJu KIM Kyung-Min KIM Kwangjo KIM 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 176-183
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
unknown attacksunsupervised learningant clustering algorithmfuzzy logic
 Summary | Full Text:PDF(1.4MB)

Efficient and Secure File Deduplication in Cloud Storage
Youngjoo SHIN Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/02/01
Vol. E97-D  No. 2  pp. 184-197
Type of Manuscript:  PAPER
Category: Fundamentals of Information Systems
Keyword: 
cloud computing securitydata deduplicationpredicate encryptiononline guessing attack
 Summary | Full Text:PDF(487KB)

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security
Kyusuk HAN Taeshik SHON Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/08/01
Vol. E94-B  No. 8  pp. 2235-2238
Type of Manuscript:  Special Section LETTER (Special Section on Deployment and Operation of New Internet Technology: Challenges and Approaches)
Category: 
Keyword: 
VoIPID-based cryptosystemone-way key agreementauthenticationkey agreement
 Summary | Full Text:PDF(1.2MB)

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies
Kyusuk HAN Kwangjo KIM Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6  pp. 1181-1184
Type of Manuscript:  Special Section LETTER (Special Section on Emerging Technologies of Ubiquitous Computing Systems)
Category: 
Keyword: 
ubiquitous computingcontext-awarenessLocation Based Serviceprivacyauthenticationcredibility
 Summary | Full Text:PDF(1MB)

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment
Jangseong KIM Taeshik SHON Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/03/01
Vol. E94-B  No. 3  pp. 686-689
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication Technologies for Next-generation Mobile Multimedia Life)
Category: 
Keyword: 
privacy protectionlocation supporting protocolubiquitouschild safety
 Summary | Full Text:PDF(408.2KB)

On the Security of RFID Group Scanning Protocols
Duc Nguyen DANG Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3  pp. 528-530
Type of Manuscript:  Special Section LETTER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
yoking-proofgrouping-proofco-existence-proofrelay attack
 Summary | Full Text:PDF(113.5KB)

Security Analysis of an ID-Based Key Agreement for Peer Group Communication
Duc-Liem VO Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/11/01
Vol. E90-A  No. 11  pp. 2624-2625
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
group key agreementcryptanalysispairingsimpersonation attack
 Summary | Full Text:PDF(53.7KB)

A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme
Fangguo ZHANG Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/02/01
Vol. E86-A  No. 2  pp. 515-516
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
signature schemeconvertible limited verifier signatureuniversal forgery
 Summary | Full Text:PDF(106.1KB)

Remarks on the Unknown Key Share Attacks
Joonsang BAEK Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A  No. 12  pp. 2766-2769
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
unknown key-share attackduplicate-signature key selectionpublic key substitutionkey agreement protocol
 Summary | Full Text:PDF(162KB)

On Generating Cryptographically Desirable Substitutions
Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1031-1035
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Common-Key Systems
Keyword: 
 Summary | Full Text:PDF(403.6KB)