Search the dblp DataBase
Howon Kim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Namje Park , Jin Kwak , Seungjoo Kim , Dongho Won , Howon Kim WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:741-748 [Conf ] Namje Park , Howon Kim , Kyoil Chung , Seungjoo Kim , Dongho Won XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP ] AWIC, 2005, pp:367-373 [Conf ] Howon Kim , Mun-Kyu Lee , Dong Kyue Kim , Sang-Kyoon Chung , Kyoil Chung Design and Implementation of Crypto Co-processor and Its Application to Security Systems. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:1104-1109 [Conf ] Byungil Lee , Howon Kim Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:469-475 [Conf ] Namje Park , Kiyoung Moon , Howon Kim , Seungjoo Kim , Dongho Won XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. [Citation Graph (0, 0)][DBLP ] EC-Web, 2005, pp:316-326 [Conf ] Dong-Guk Han , Tsuyoshi Takagi , Tae-Hyun Kim , Howon Kim , Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:864-873 [Conf ] Byungil Lee , Howon Kim A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:673-682 [Conf ] Jin Kwak , Keunwoo Rhee , Namje Park , Howon Kim , Seungjoo Kim , Kouichi Sakurai , Dongho Won An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:579-590 [Conf ] Khin Mi Mi Aung , Kiejin Park , Jong Sou Park , Howon Kim , Byungil Lee A Survivability Model for Cluster System Under DoS Attacks. [Citation Graph (0, 0)][DBLP ] HPCC, 2005, pp:567-572 [Conf ] Dong-Guk Han , Tsuyoshi Takagi , Howon Kim , Kyoil Chung New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:375-384 [Conf ] Mun-Kyu Lee , Howon Kim , Dowon Hong , Kyoil Chung Efficient Exponentiation in GF (p m ) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:584-593 [Conf ] Namje Park , Howon Kim , Kyoil Chung , Sungwon Sohn , Dongho Won XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:251-259 [Conf ] Namje Park , Howon Kim , Seungjoo Kim , Dongho Won Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1146-1155 [Conf ] Inshil Doh , Kijoon Chae , Howon Kim , Kyoil Chung Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:317-326 [Conf ] Hyun Suk Lee , Howon Kim , Jong Kim , Sunggu Lee Adaptive Virutal Cut-through as an Alternative to Wormhole Routing. [Citation Graph (0, 0)][DBLP ] ICPP (1), 1995, pp:68-75 [Conf ] Namje Park , Seungjoo Kim , Dongho Won , Howon Kim Security Analysis and Implementation Leveraging Globally Networked RFIDs. [Citation Graph (0, 0)][DBLP ] PWC, 2006, pp:494-505 [Conf ] Dong-Guk Han , Sung-Kyoung Kim , Howon Kim , Kyoil Chung , Jongin Lim Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:238-253 [Conf ] JooYoung Lee , Howon Kim A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach. [Citation Graph (0, 0)][DBLP ] KES (1), 2006, pp:1250-1258 [Conf ] Namje Park , Jin Kwak , Seungjoo Kim , Dongho Won , Howon Kim Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP ] KES (1), 2006, pp:924-934 [Conf ] Howon Kim , Thomas J. Wollinger , Yongje Choi , Kyoil Chung , Christof Paar Hyperelliptic Curve Coprocessors on a FPGA. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:360-374 [Conf ] Mun-Kyu Lee , Keon Tae Kim , Howon Kim , Dong Kyue Kim Efficient Hardware Implementation of Elliptic Curve Cryptography over GF (p m ). [Citation Graph (0, 0)][DBLP ] WISA, 2005, pp:207-217 [Conf ] Howon Kim , In-So Kweon Appearance-Cloning: Photo-Consistent Scene Recovery from Multi-View Images. [Citation Graph (0, 0)][DBLP ] International Journal of Computer Vision, 2006, v:66, n:2, pp:163-192 [Journal ] Ku-Young Chang , Howon Kim , Ju-Sung Kang , Hyun-Sook Cho An extension of TYT algorithm for GF((2n )m ) using precomputation. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2004, v:92, n:5, pp:231-234 [Journal ] Howon Kim , Hyun Suk Lee , Sunggu Lee , Jong Kim Adaptive Virtual Cut-Through as a Viable Routing Method. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1998, v:52, n:1, pp:82-95 [Journal ] Sung-Kyoung Kim , Dong-Guk Han , Howon Kim , Kyoil Chung , Jongin Lim SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:286-295 [Conf ] JeaHoon Park , Hoon Jae Lee , JaeCheol Ha , Yongje Choi , Howon Kim , Sang-Jae Moon A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:417-426 [Conf ] Mun-Kyu Lee , Jung Ki Min , Seok Hun Kang , Sang-Hwa Chung , Howon Kim , Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. [Citation Graph (0, 0)][DBLP ] WISA, 2006, pp:173-186 [Conf ] HeeSeok Kim , Tae-Hyun Kim , Jeong Choon Ryoo , Dong-Guk Han , Howon Kim , Jongin Lim Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP ] WISTP, 2007, pp:39-52 [Conf ] Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. [Citation Graph (, )][DBLP ] Mobile Platform for Networked RFID Applications. [Citation Graph (, )][DBLP ] A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs