Ho Won Kim
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
32 | EE | Dong-Guk Han, Dooho Choi, Howon Kim: Improved Computation of Square Roots in Specific Finite Fields. IEEE Trans. Computers 58(2): 188-196 (2009) |
2008 | ||
31 | EE | Namje Park, Youjin Song, Dongho Won, Howon Kim: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. APWeb 2008: 331-341 |
2007 | ||
30 | EE | Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi: Compressed XTR. ACNS 2007: 420-431 |
29 | EE | Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim: SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295 |
28 | EE | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim: Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253 |
27 | EE | HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim: Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52 |
2006 | ||
26 | EE | Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748 |
25 | EE | Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 |
24 | EE | JeaHoon Park, Hoon Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon: A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. CIS 2006: 417-426 |
23 | EE | Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 |
22 | EE | Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung: New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384 |
21 | EE | Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung: Efficient Exponentiation in GF(pm) Using the Frobenius Map. ICCSA (4) 2006: 584-593 |
20 | EE | Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won: XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. ICCSA (5) 2006: 251-259 |
19 | EE | Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung: Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326 |
18 | EE | Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934 |
17 | EE | Namje Park, Jooyoung Lee, Howon Kim, Kyoil Chung, Sungwon Sohn: A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). NOMS 2006 |
16 | EE | Namje Park, Seungjoo Kim, Dongho Won, Howon Kim: Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505 |
15 | EE | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim: Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. WISA 2006: 173-186 |
14 | EE | Howon Kim, In-So Kweon: Appearance-Cloning: Photo-Consistent Scene Recovery from Multi-View Images. International Journal of Computer Vision 66(2): 163-192 (2006) |
2005 | ||
13 | EE | Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won: XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373 |
12 | EE | Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung: Design and Implementation of Crypto Co-processor and Its Application to Security Systems. CIS (2) 2005: 1104-1109 |
11 | EE | Byungil Lee, Howon Kim: Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. CIS (2) 2005: 469-475 |
10 | EE | Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won: XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326 |
9 | EE | Byungil Lee, Howon Kim: A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. EUC Workshops 2005: 673-682 |
8 | EE | Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung: Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873 |
7 | EE | Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee: A Survivability Model for Cluster System Under DoS Attacks. HPCC 2005: 567-572 |
6 | EE | Namje Park, Howon Kim, Seungjoo Kim, Dongho Won: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155 |
5 | EE | Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim: Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). WISA 2005: 207-217 |
2004 | ||
4 | EE | Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil Chung, Christof Paar: Hyperelliptic Curve Coprocessors on a FPGA. WISA 2004: 360-374 |
3 | EE | Ku-Young Chang, Howon Kim, Ju-Sung Kang, Hyun-Sook Cho: An extension of TYT algorithm for GF((2n)m) using precomputation. Inf. Process. Lett. 92(5): 231-234 (2004) |
1998 | ||
2 | Howon Kim, Hyun Suk Lee, Sunggu Lee, Jong Kim: Adaptive Virtual Cut-Through as a Viable Routing Method. J. Parallel Distrib. Comput. 52(1): 82-95 (1998) | |
1995 | ||
1 | Hyun Suk Lee, Howon Kim, Jong Kim, Sunggu Lee: Adaptive Virutal Cut-through as an Alternative to Wormhole Routing. ICPP (1) 1995: 68-75 |