The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kyoil Chung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won
    XKMS-Based Key Management for Open LBS in Web Services Environment. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:367-373 [Conf]
  2. Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung
    Design and Implementation of Crypto Co-processor and Its Application to Security Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1104-1109 [Conf]
  3. Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung
    Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:864-873 [Conf]
  4. Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won
    XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:323-333 [Conf]
  5. Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung
    New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:375-384 [Conf]
  6. Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung
    Efficient Exponentiation in GF(pm) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:584-593 [Conf]
  7. Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won
    XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:251-259 [Conf]
  8. You Sung Kang, KyungHee Oh, ByungHo Chung, Kyoil Chung, DaeHun Nyang
    Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:915-924 [Conf]
  9. Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung
    Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:317-326 [Conf]
  10. Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng
    A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:191-196 [Conf]
  11. Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou
    Security Frameworks for Open LBS Based on Web Services Security Mechanism. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:609-618 [Conf]
  12. Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
    Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:238-253 [Conf]
  13. Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung
    A DPA Countermeasure by Randomized Frobenius Decomposition. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:271-282 [Conf]
  14. Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park
    A Location Privacy Protection Mechanism for Smart Space. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:162-173 [Conf]
  15. Howon Kim, Thomas J. Wollinger, Yongje Choi, Kyoil Chung, Christof Paar
    Hyperelliptic Curve Coprocessors on a FPGA. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:360-374 [Conf]
  16. Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
    SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:286-295 [Conf]

  17. How to Integrate Diverse Client Authentication Protocol with various authentication means. [Citation Graph (, )][DBLP]


  18. Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. [Citation Graph (, )][DBLP]


  19. A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002