2008 |
6 | EE | Seog Chung Seo,
Dong-Guk Han,
Hyung Chan Kim,
Seokhie Hong:
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote.
IEICE Transactions 91-D(5): 1338-1347 (2008) |
2007 |
5 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Wook Shin,
Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
ARES 2007: 1160-1166 |
4 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Wook Shin,
Kouichi Sakurai:
Enforcement of Integrated Security Policy in Trusted Operating Systems.
IWSEC 2007: 214-229 |
2006 |
3 | EE | Seog Chung Seo,
Hyung Chan Kim,
R. S. Ramakrishna:
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.
EUC Workshops 2006: 291-301 |
2 | EE | Hyung Chan Kim,
Wook Shin,
R. S. Ramakrishna,
Kouichi Sakurai:
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
ISPEC 2006: 235-247 |
2005 |
1 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Kouichi Sakurai:
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Transactions 88-A(1): 270-279 (2005) |