The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Howon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:741-748 [Conf]
  2. Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won
    XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:367-373 [Conf]
  3. Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung
    Design and Implementation of Crypto Co-processor and Its Application to Security Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1104-1109 [Conf]
  4. Byungil Lee, Howon Kim
    Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:469-475 [Conf]
  5. Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won
    XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2005, pp:316-326 [Conf]
  6. Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung
    Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:864-873 [Conf]
  7. Byungil Lee, Howon Kim
    A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:673-682 [Conf]
  8. Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
    An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:579-590 [Conf]
  9. Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee
    A Survivability Model for Cluster System Under DoS Attacks. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:567-572 [Conf]
  10. Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung
    New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:375-384 [Conf]
  11. Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung
    Efficient Exponentiation in GF(pm) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:584-593 [Conf]
  12. Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won
    XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:251-259 [Conf]
  13. Namje Park, Howon Kim, Seungjoo Kim, Dongho Won
    Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1146-1155 [Conf]
  14. Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung
    Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:317-326 [Conf]
  15. Hyun Suk Lee, Howon Kim, Jong Kim, Sunggu Lee
    Adaptive Virutal Cut-through as an Alternative to Wormhole Routing. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1995, pp:68-75 [Conf]
  16. Namje Park, Seungjoo Kim, Dongho Won, Howon Kim
    Security Analysis and Implementation Leveraging Globally Networked RFIDs. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:494-505 [Conf]
  17. Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
    Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:238-253 [Conf]
  18. JooYoung Lee, Howon Kim
    A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:1250-1258 [Conf]
  19. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
    Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:924-934 [Conf]
  20. Howon Kim, Thomas J. Wollinger, Yongje Choi, Kyoil Chung, Christof Paar
    Hyperelliptic Curve Coprocessors on a FPGA. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:360-374 [Conf]
  21. Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim
    Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:207-217 [Conf]
  22. Howon Kim, In-So Kweon
    Appearance-Cloning: Photo-Consistent Scene Recovery from Multi-View Images. [Citation Graph (0, 0)][DBLP]
    International Journal of Computer Vision, 2006, v:66, n:2, pp:163-192 [Journal]
  23. Ku-Young Chang, Howon Kim, Ju-Sung Kang, Hyun-Sook Cho
    An extension of TYT algorithm for GF((2n)m) using precomputation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:92, n:5, pp:231-234 [Journal]
  24. Howon Kim, Hyun Suk Lee, Sunggu Lee, Jong Kim
    Adaptive Virtual Cut-Through as a Viable Routing Method. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1998, v:52, n:1, pp:82-95 [Journal]
  25. Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
    SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:286-295 [Conf]
  26. JeaHoon Park, Hoon Jae Lee, JaeCheol Ha, Yongje Choi, Howon Kim, Sang-Jae Moon
    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:417-426 [Conf]
  27. Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim
    Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:173-186 [Conf]
  28. HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
    Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:39-52 [Conf]

  29. Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. [Citation Graph (, )][DBLP]


  30. Mobile Platform for Networked RFID Applications. [Citation Graph (, )][DBLP]


  31. A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002