BibTeX records: Seong-Min Hong 0001

download as .bib file

@article{DBLP:journals/access/CheonHHKKKSSS18,
  author    = {Jung Hee Cheon and
               Kyoohyung Han and
               Seong{-}Min Hong and
               Hyoun Jin Kim and
               Junsoo Kim and
               Suseong Kim and
               Hosung Seo and
               Hyungbo Shim and
               Yongsoo Song},
  title     = {Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated
               Encryption},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {24325--24339},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2819189},
  doi       = {10.1109/ACCESS.2018.2819189},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/CheonHHKKKSSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChungHKHY09,
  author    = {Byungchun Chung and
               Junbeom Hur and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Improved batch exponentiation},
  journal   = {Inf. Process. Lett.},
  volume    = {109},
  number    = {15},
  pages     = {832--837},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.ipl.2009.04.008},
  doi       = {10.1016/j.ipl.2009.04.008},
  timestamp = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ipl/ChungHKHY09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeKLHY07,
  author    = {Jaewon Lee and
               Heeyoul Kim and
               Younho Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Parallelized Scalar Multiplication on Elliptic Curves Defined over
               Optimal Extension Field},
  journal   = {I. J. Network Security},
  volume    = {4},
  number    = {1},
  pages     = {99--106},
  year      = {2007},
  url       = {http://ijns.femto.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p99-106.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LeeKLHY07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeePKHY06,
  author    = {Younho Lee and
               Yongsu Park and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Rogue Public Key Registration Attack and the Importance of 'Proof
               of Possession' in the {PKI} Environment},
  journal   = {{IEICE} Transactions},
  volume    = {89-D},
  number    = {8},
  pages     = {2452--2455},
  year      = {2006},
  url       = {https://doi.org/10.1093/ietisy/e89-d.8.2452},
  doi       = {10.1093/ietisy/e89-d.8.2452},
  timestamp = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/LeePKHY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeKHY06,
  author    = {Younho Lee and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains},
  journal   = {I. J. Network Security},
  volume    = {2},
  number    = {1},
  pages     = {34--40},
  year      = {2006},
  url       = {http://ijns.femto.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p34-40.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LeeKHY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimLHY06,
  author    = {Heeyoul Kim and
               Younho Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Active Trial-and-error Attack on {SASC} Protocols},
  journal   = {I. J. Network Security},
  volume    = {2},
  number    = {2},
  pages     = {105--110},
  year      = {2006},
  url       = {http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p105-110.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/KimLHY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeHY05,
  author    = {Jaewon Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Securing Mobile Agents by Integrity-Based Encryption},
  journal   = {{IEICE} Transactions},
  volume    = {88-D},
  number    = {9},
  pages     = {2102--2104},
  year      = {2005},
  url       = {https://doi.org/10.1093/ietisy/e88-d.9.2102},
  doi       = {10.1093/ietisy/e88-d.9.2102},
  timestamp = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/LeeHY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HurLHY05,
  author    = {Junbeom Hur and
               Younho Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  editor    = {Dongho Won and
               Seungjoo Kim},
  title     = {Trust Management for Resilient Wireless Sensor Networks},
  booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3935},
  pages     = {56--68},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11734727\_7},
  doi       = {10.1007/11734727\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/HurLHY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/KimHYC05,
  author    = {Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon and
               Jung Wan Cho},
  title     = {Secure Group Communication with Multiplicative One-way Functions},
  booktitle = {International Symposium on Information Technology: Coding and Computing
               {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages     = {685--690},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://doi.org/10.1109/ITCC.2005.252},
  doi       = {10.1109/ITCC.2005.252},
  timestamp = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/itcc/KimHYC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HongLPCY00,
  author    = {Seong{-}Min Hong and
               Seungwon Lee and
               Yongsoo Park and
               Yookun Cho and
               Hyunsoo Yoon},
  title     = {On the construction of a powerful distributed authentication server
               without additional key management},
  journal   = {Comput. Commun.},
  volume    = {23},
  number    = {17},
  pages     = {1638--1644},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0140-3664(00)00250-4},
  doi       = {10.1016/S0140-3664(00)00250-4},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/HongLPCY00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeHYC99,
  author    = {Seungwon Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon and
               Yookun Cho},
  editor    = {Josef Pieprzyk and
               Reihaneh Safavi{-}Naini and
               Jennifer Seberry},
  title     = {Accelerating Key Establishment Protocols for Mobile Communication},
  booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1587},
  pages     = {51--63},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48970-3\_5},
  doi       = {10.1007/3-540-48970-3\_5},
  timestamp = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/LeeHYC99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HongSLY98,
  author    = {Seong{-}Min Hong and
               Jun{-}Bum Shin and
               H. Lee{-}Kwang and
               Hyunsoo Yoon},
  title     = {A new appraoch to server-aided secret computation},
  booktitle = {The 1st International Conference on Information Security and Cryptology,
               {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings},
  pages     = {33--45},
  publisher = {Korea Institute of Information Security and Cryptology {(KIISC)}},
  year      = {1998},
  timestamp = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/HongSLY98.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HongOY96,
  author    = {Seong{-}Min Hong and
               Sang{-}Yeop Oh and
               Hyunsoo Yoon},
  editor    = {Ueli M. Maurer},
  title     = {New Modular Multiplication Algorithms for Fast Modular Exponentiation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1070},
  pages     = {166--177},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-68339-9\_15},
  doi       = {10.1007/3-540-68339-9\_15},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/HongOY96.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics