The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Choonsik Park: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yongdae Kim, Sangjin Lee, Choonsik Park
    On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  2. Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park
    New Public-Key Cryptosystem Using Braid Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:166-183 [Conf]
  3. Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park
    New Public Key Cryptosystem Using Finite Non Abelian Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:470-485 [Conf]
  4. Jung Hee Cheon, Seongtaek Chee, Choonsik Park
    S-boxes with Controllable Nonlinearity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:286-294 [Conf]
  5. Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa
    Efficient Anonymous Channel and All/Nothing Election Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:248-259 [Conf]
  6. Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii
    On Key Distribution and Authentication in Mobile Radio Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:461-465 [Conf]
  7. Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choon Sik Park, Dong-Kyoo Kim
    Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:205-214 [Conf]
  8. Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choon Sik Park
    An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:225-234 [Conf]
  9. Ju-Sung Kang, Seongtaek Chee, Choonsik Park
    A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:1-13 [Conf]
  10. Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim
    On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:38-52 [Conf]
  11. Sangwoo Park, Seongtaek Chee, Choonsik Park, Soo Hak Sung
    How to construct balanced Boolean functions with good global avalanche characteristics. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:121-130 [Conf]
  12. Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim
    An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:72-79 [Conf]
  13. Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim
    Adaptation Enhanced Mechanism for Web Survivability. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:650-653 [Conf]
  14. Soo Hak Sung, Seongtaek Chee, Choonsik Park
    Global Avalanche Characteristics and Propagation Criterion of Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:1, pp:21-24 [Journal]

  15. The Vulnerabilities Analysis of Fuzzy Vault Using Password. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002