Browse "School of Computing(전산학부)" by Author Hong, SM

Showing results 1 to 12 of 12

1
A Distributed Model for Secure and Scalable Group Communication

Kim, H; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.7 - 12, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

2
A new appraoch to server-aided secret computation

Hong, SM; Shin, JB; Kwang, H.L.; Yoon, Hyunsoo, ICISC 1998 (The 1st International Conference on Information Security and Cryptology), pp.33 - 45, 1998-12-18

3
A Probabilistic Active Attack on Server-aided Secret Computation Protocols

Lee, S; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.24 - 33, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

4
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

5
Accelerating key establishment protocols for mobile communication

Lee, S; Hong, SM; Yoon, Hyunsoo; Cho, Y, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1587, pp.51 - 63, 1999-04

6
Accelerating Key Establishment Protocols for Mobile Communication

Lee, SW; Hong, SM; Yoon, Hyunsoo; Cho, Y., ACISP 1999 ( Information Security and Privacy, 4th Australasian Conference), pp.51 - 63, Springer Verlag (Germany), 1999-04-08

7
Fast Computation Methods for Scalar Multiplication on Elliptic Curves defined over Higher Characteristic Finite Field

Lee, J; Kim, D; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.18 - 23, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

8
Finding Shorter Addition/Subtraction-Chains

Kweon, K; Hong, SM; Oh, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.13 - 17, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

9
On the construction of a powerful distributed authentication server without additional key management

Hong, SM; Lee, S; Park, Y; Cho, Y; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.23, no.17, pp.1638 - 1644, 2000-11

10
Secure group communication with multiplicative one-way functions

Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04

11
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

12
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0