dblp.uni-trier.dewww.uni-trier.de

Seong-Min Hong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
8EEYounho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon: Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. IEICE Transactions 89-D(8): 2452-2455 (2006)
2005
7EEJunbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon: Trust Management for Resilient Wireless Sensor Networks. ICISC 2005: 56-68
6EEHeeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho: Secure Group Communication with Multiplicative One-way Functions. ITCC (1) 2005: 685-690
5EEJaewon Lee, Seong-Min Hong, Hyunsoo Yoon: Securing Mobile Agents by Integrity-Based Encryption. IEICE Transactions 88-D(9): 2102-2104 (2005)
2000
4EESeong-Min Hong, Seungwon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon: On the construction of a powerful distributed authentication server without additional key management. Computer Communications 23(17): 1638-1644 (2000)
1999
3EESeungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho: Accelerating Key Establishment Protocols for Mobile Communication. ACISP 1999: 51-63
1998
2 Seong-Min Hong, Jun-Bum Shin, H. Lee-Kwang, Hyunsoo Yoon: A new appraoch to server-aided secret computation. ICISC 1998: 33-45
1996
1EESeong-Min Hong, Sang-Yeop Oh, Hyunsoo Yoon: New Modular Multiplication Algorithms for Fast Modular Exponentiation. EUROCRYPT 1996: 166-177

Coauthor Index

1Jung Wan Cho [6]
2Yookun Cho [3] [4]
3Junbeom Hur [7]
4Heeyoul Kim [6] [8]
5Jaewon Lee [5]
6Seungwon Lee [3] [4]
7Younho Lee [7] [8]
8H. Lee-Kwang [2]
9Sang-Yeop Oh [1]
10Yongsoo Park [4]
11Yongsu Park [8]
12Jun-Bum Shin [2]
13Hyunsoo Yoon [1] [2] [3] [4] [5] [6] [7] [8]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)