Dongho Won

4.5k total citations
178 papers, 1.9k citations indexed

About

Dongho Won is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Dongho Won has authored 178 papers receiving a total of 1.9k indexed citations (citations by other indexed papers that have themselves been cited), including 135 papers in Computer Networks and Communications, 122 papers in Information Systems and 60 papers in Artificial Intelligence. Recurrent topics in Dongho Won's work include Advanced Authentication Protocols Security (104 papers), User Authentication and Security Systems (85 papers) and Cryptography and Data Security (45 papers). Dongho Won is often cited by papers focused on Advanced Authentication Protocols Security (104 papers), User Authentication and Security Systems (85 papers) and Cryptography and Data Security (45 papers). Dongho Won collaborates with scholars based in South Korea, Australia and United States. Dongho Won's co-authors include Junghyun Nam, Seungjoo Kim, Youngsook Lee, Jaewook Jung, Younsung Choi, Jiye Kim, Donghoon Lee, Juryon Paik, Donghyun Choi and Woongryul Jeon and has published in prestigious journals such as PLoS ONE, IEEE Access and Sensors.

In The Last Decade

Dongho Won

159 papers receiving 1.8k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Dongho Won South Korea 24 1.5k 1.3k 651 410 167 178 1.9k
Dheerendra Mishra India 22 1.3k 0.9× 1.3k 1.0× 594 0.9× 329 0.8× 209 1.3× 100 1.6k
Husnain Naqvi Pakistan 16 931 0.6× 776 0.6× 601 0.9× 200 0.5× 138 0.8× 31 1.3k
Luigi V. Mancini Italy 30 2.0k 1.4× 1.2k 0.9× 1.5k 2.4× 401 1.0× 140 0.8× 116 3.2k
Shiuh‐Pyng Shieh Taiwan 19 1.2k 0.8× 743 0.6× 689 1.1× 503 1.2× 178 1.1× 85 1.7k
Mohammad Sabzinejad Farash Iran 26 1.7k 1.2× 1.5k 1.1× 824 1.3× 317 0.8× 228 1.4× 43 1.9k
Chun‐I Fan Taiwan 20 863 0.6× 1.0k 0.8× 1.3k 2.0× 230 0.6× 216 1.3× 130 2.0k
Claudio Soriente United States 21 809 0.6× 540 0.4× 654 1.0× 358 0.9× 156 0.9× 58 1.5k
Kwangjo Kim South Korea 24 1.0k 0.7× 654 0.5× 1.4k 2.1× 294 0.7× 223 1.3× 129 1.9k
Aikaterini Mitrokotsa Sweden 15 1.0k 0.7× 407 0.3× 573 0.9× 399 1.0× 61 0.4× 61 1.3k
Abdelmadjid Bouabdallah France 13 842 0.6× 541 0.4× 410 0.6× 193 0.5× 71 0.4× 24 1.3k

Countries citing papers authored by Dongho Won

Since Specialization
Citations

This map shows the geographic impact of Dongho Won's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dongho Won with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dongho Won more than expected).

Fields of papers citing papers by Dongho Won

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dongho Won. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dongho Won. The network helps show where Dongho Won may publish in the future.

Co-authorship network of co-authors of Dongho Won

This figure shows the co-authorship network connecting the top 25 collaborators of Dongho Won. A scholar is included among the top collaborators of Dongho Won based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dongho Won. Dongho Won is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lee, Youngsook, et al.. (2023). An Improved Lightweight User Authentication Scheme for the Internet of Medical Things. Sensors. 23(3). 1122–1122. 31 indexed citations
3.
Jung, Jaewook, et al.. (2018). Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme. 438–441. 2 indexed citations
4.
Paik, Juryon, et al.. (2014). Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data. Journal of information science and engineering. 30. 787–817. 2 indexed citations
5.
Kwak, Jin, et al.. (2013). Privacy-enhanced social network service SNS. 16. 6905–6919. 1 indexed citations
6.
Won, Dongho, et al.. (2012). An Analysis of Cloud System Security Functional Requirement. 9(6). 495–502. 1 indexed citations
7.
Nam, Junghyun, Minkyu Park, Sangchul Han, Juryon Paik, & Dongho Won. (2012). Scalable Group Key Exchange for Securing Distributed Operating Systems. Journal of information science and engineering. 28(5). 829–857. 1 indexed citations
8.
Won, Dongho, et al.. (2011). Secure Data Deletion for USB Flash Memory. Journal of information science and engineering. 27(3). 933–952. 17 indexed citations
9.
You, Kwanho, Sangwon Lee, Won Ho Kim, & Dongho Won. (2010). Proceedings of the 4th International Conference on Uniquitous Information Management and Communication. 1 indexed citations
10.
Paik, Juryon, et al.. (2009). Fast Extraction of Maximal Frequent Subtrees Using Bits Representation. Journal of information science and engineering. 25(2). 435–464. 1 indexed citations
11.
Won, Dongho, et al.. (2008). A JTAG Protection Method for Mobile Application Processors. The Transactions of The Korean Institute of Electrical Engineers. 57(4). 706–714. 1 indexed citations
12.
Choi, Younsung, et al.. (2007). Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1. Information Security and Cryptology. 17(6). 99–119. 2 indexed citations
13.
Choi, Younsung, et al.. (2007). The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password. Information Security and Cryptology. 17(1). 41–55. 1 indexed citations
14.
Choi, Younsung, et al.. (2007). Cryptanalysis on the Authentication Mechanism of the NateOn Messenger. Information Security and Cryptology. 17(1). 67–80. 1 indexed citations
15.
Won, Dongho & Seungjoo Kim. (2006). Information security and cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005 : revised selected papers. Springer eBooks. 2 indexed citations
16.
Won, Dongho, et al.. (2005). Group Key Agreement Protocols for Combined Wired/Wireless Networks. The Journal of Korean Institute of Communications and Information Sciences. 30. 607–615. 1 indexed citations
17.
Won, Dongho, et al.. (2005). A Study on the Security Management for Critical Key Infrastructure(SCADA). The Journal of Korean Institute of Communications and Information Sciences. 30(8). 838–848. 1 indexed citations
18.
Nam, Junghyun, Jinwoo Lee, Sungduk Kim, Seungjoo Kim, & Dongho Won. (2004). Provably-Secure and Communication-Efficient Protocol for Dynamic Group Key Exchange. Information Security and Cryptology. 14(4). 163–181. 5 indexed citations
19.
Won, Dongho, et al.. (2003). On Differential Power Analysis Attack on the Addition Modular 2 N Operation of Smart Cards.. Security and Management. 260–266. 1 indexed citations
20.
Choi, Seung‐Bok, et al.. (2000). Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. 221–234. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026