2006 |
8 | EE | Younho Lee,
Yongsu Park,
Heeyoul Kim,
Seong-Min Hong,
Hyunsoo Yoon:
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Transactions 89-D(8): 2452-2455 (2006) |
2005 |
7 | EE | Junbeom Hur,
Younho Lee,
Seong-Min Hong,
Hyunsoo Yoon:
Trust Management for Resilient Wireless Sensor Networks.
ICISC 2005: 56-68 |
6 | EE | Heeyoul Kim,
Seong-Min Hong,
Hyunsoo Yoon,
Jung Wan Cho:
Secure Group Communication with Multiplicative One-way Functions.
ITCC (1) 2005: 685-690 |
5 | EE | Jaewon Lee,
Seong-Min Hong,
Hyunsoo Yoon:
Securing Mobile Agents by Integrity-Based Encryption.
IEICE Transactions 88-D(9): 2102-2104 (2005) |
2000 |
4 | EE | Seong-Min Hong,
Seungwon Lee,
Yongsoo Park,
Yookun Cho,
Hyunsoo Yoon:
On the construction of a powerful distributed authentication server without additional key management.
Computer Communications 23(17): 1638-1644 (2000) |
1999 |
3 | EE | Seungwon Lee,
Seong-Min Hong,
Hyunsoo Yoon,
Yookun Cho:
Accelerating Key Establishment Protocols for Mobile Communication.
ACISP 1999: 51-63 |
1998 |
2 | | Seong-Min Hong,
Jun-Bum Shin,
H. Lee-Kwang,
Hyunsoo Yoon:
A new appraoch to server-aided secret computation.
ICISC 1998: 33-45 |
1996 |
1 | EE | Seong-Min Hong,
Sang-Yeop Oh,
Hyunsoo Yoon:
New Modular Multiplication Algorithms for Fast Modular Exponentiation.
EUROCRYPT 1996: 166-177 |