dblp.uni-trier.dewww.uni-trier.de

Howon Kim

Ho Won Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
32EEDong-Guk Han, Dooho Choi, Howon Kim: Improved Computation of Square Roots in Specific Finite Fields. IEEE Trans. Computers 58(2): 188-196 (2009)
2008
31EENamje Park, Youjin Song, Dongho Won, Howon Kim: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. APWeb 2008: 331-341
2007
30EEMasaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi: Compressed XTR. ACNS 2007: 420-431
29EESung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim: SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295
28EEDong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim: Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253
27EEHeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim: Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52
2006
26EENamje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748
25EETae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181
24EEJeaHoon Park, Hoon Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon: A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. CIS 2006: 417-426
23EEJin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590
22EEDong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung: New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384
21EEMun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung: Efficient Exponentiation in GF(pm) Using the Frobenius Map. ICCSA (4) 2006: 584-593
20EENamje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won: XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. ICCSA (5) 2006: 251-259
19EEInshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung: Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326
18EENamje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim: Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934
17EENamje Park, Jooyoung Lee, Howon Kim, Kyoil Chung, Sungwon Sohn: A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). NOMS 2006
16EENamje Park, Seungjoo Kim, Dongho Won, Howon Kim: Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505
15EEMun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim: Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. WISA 2006: 173-186
14EEHowon Kim, In-So Kweon: Appearance-Cloning: Photo-Consistent Scene Recovery from Multi-View Images. International Journal of Computer Vision 66(2): 163-192 (2006)
2005
13EENamje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won: XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373
12EEHowon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung: Design and Implementation of Crypto Co-processor and Its Application to Security Systems. CIS (2) 2005: 1104-1109
11EEByungil Lee, Howon Kim: Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. CIS (2) 2005: 469-475
10EENamje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won: XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326
9EEByungil Lee, Howon Kim: A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. EUC Workshops 2005: 673-682
8EEDong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung: Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873
7EEKhin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee: A Survivability Model for Cluster System Under DoS Attacks. HPCC 2005: 567-572
6EENamje Park, Howon Kim, Seungjoo Kim, Dongho Won: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155
5EEMun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim: Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). WISA 2005: 207-217
2004
4EEHowon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil Chung, Christof Paar: Hyperelliptic Curve Coprocessors on a FPGA. WISA 2004: 360-374
3EEKu-Young Chang, Howon Kim, Ju-Sung Kang, Hyun-Sook Cho: An extension of TYT algorithm for GF((2n)m) using precomputation. Inf. Process. Lett. 92(5): 231-234 (2004)
1998
2 Howon Kim, Hyun Suk Lee, Sunggu Lee, Jong Kim: Adaptive Virtual Cut-Through as a Viable Routing Method. J. Parallel Distrib. Comput. 52(1): 82-95 (1998)
1995
1 Hyun Suk Lee, Howon Kim, Jong Kim, Sunggu Lee: Adaptive Virutal Cut-through as an Alternative to Wormhole Routing. ICPP (1) 1995: 68-75

Coauthor Index

1Khin Mi Mi Aung [7]
2Kijoon Chae (Ki-Joon Chae) [19]
3Ku-Young Chang [3]
4Hyun-Sook Cho [3]
5Dooho Choi [32]
6YongJe Choi [4] [24]
7Kyoil Chung [4] [8] [12] [13] [17] [19] [20] [21] [22] [28] [29]
8Sang-Hwa Chung [15]
9Sang-Kyoon Chung [12]
10Inshil Doh [19]
11JaeCheol Ha (Jae-Cheol Ha) [24]
12Dong-Guk Han [8] [22] [25] [27] [28] [29] [30] [32]
13Yasushi Hibino [30]
14Dowon Hong [21]
15Ju-Sung Kang [3]
16Seok Hun Kang [15]
17Dong Kyue Kim [5] [12] [15]
18HeeSeok Kim [27]
19Jong Kim [1] [2]
20Keon Tae Kim [5]
21Seungjoo Kim [6] [10] [13] [16] [18] [23] [26]
22Sung-Kyoung Kim [28] [29]
23Tae-Hyun Kim [8] [25] [27]
24Jin Kwak [18] [23] [26]
25In-So Kweon [14]
26Byungil Lee [7] [9] [11]
27Hoon Jae Lee [24]
28Hyun Suk Lee [1] [2]
29Jooyoung Lee [17]
30Mun-Kyu Lee [5] [12] [15] [21]
31Sunggu Lee [1] [2]
32Jongin Lim (Jong In Lim) [25] [27] [28] [29]
33Jung Ki Min [15]
34Kiyoung Moon [10]
35Sang-Jae Moon [24]
36Christof Paar [4]
37JeaHoon Park [24]
38Jong Sou Park [7]
39Kiejin Park [7]
40Namje Park [6] [10] [13] [16] [17] [18] [20] [23] [26] [31]
41Keunwoo Rhee [23]
42Jeong Choon Ryoo [27]
43Kouichi Sakurai [23]
44Masaaki Shirase [30]
45Sungwon Sohn [17] [20]
46Youjin Song [31]
47Tsuyoshi Takagi [8] [22] [25] [30]
48Thomas J. Wollinger [4]
49Dongho Won [6] [10] [13] [16] [18] [20] [23] [26] [31]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)