BibTeX records: Haeryong Park

download as .bib file

@article{DBLP:journals/scn/ParkSKPK18,
  author       = {Taehwan Park and
                  Hwajeong Seo and
                  Junsub Kim and
                  Haeryong Park and
                  Howon Kim},
  title        = {Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based
                  Cryptography on Modern {ARM} Processor},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7012056:1--7012056:10},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7012056},
  doi          = {10.1155/2018/7012056},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ParkSKPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LeeCPK15,
  author       = {TaeJin Lee and
                  Hesun Cho and
                  Haeryong Park and
                  Jin Kwak},
  title        = {Detection of Malware Propagation in Sensor Node and Botnet Group Clustering
                  Based on E-mail Spam Analysis},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {530250:1--530250:12},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/530250},
  doi          = {10.1155/2015/530250},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LeeCPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/YoonPY14,
  author       = {Seokung Yoon and
                  Haeryong Park and
                  Hyeong Seon Yoo},
  title        = {Development of Indicators for Information Security Level Assessment
                  of VoIP Service Providers},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {2},
  pages        = {634--645},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.02.018},
  doi          = {10.3837/TIIS.2014.02.018},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/YoonPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ChoKSPCI14,
  author       = {In Kyeom Cho and
                  TaeGuen Kim and
                  Yu Jin Shim and
                  Haeryong Park and
                  Bomin Choi and
                  Eul Gyu Im},
  title        = {Malware Similarity Analysis using {API} Sequence Alignments},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {103--114},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.11.31.103},
  doi          = {10.22667/JISIS.2014.11.31.103},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ChoKSPCI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/KimYLP11,
  author       = {Kitae Kim and
                  Ikkwon Yie and
                  Seongan Lim and
                  Haeryong Park},
  title        = {A Method of Finding Bad Signatures in an RSA-Type Batch Verification},
  journal      = {Informatica},
  volume       = {22},
  number       = {2},
  pages        = {189--201},
  year         = {2011},
  url          = {http://content.iospress.com/articles/informatica/inf22-2-03},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/KimYLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Park10b,
  author       = {Haeryong Park},
  title        = {Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and
                  Key Distribution Scheme},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {93-B},
  number       = {4},
  pages        = {1013--1015},
  year         = {2010},
  url          = {https://doi.org/10.1587/transcom.E93.B.1013},
  doi          = {10.1587/TRANSCOM.E93.B.1013},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Park10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5669,
  author       = {Seokung Yoon and
                  Joongman Kim and
                  Haeryong Park and
                  Hyuncheol Jeong and
                  Yoojae Won},
  title        = {The {SEED} Cipher Algorithm and Its Use with the Secure Real-Time
                  Transport Protocol {(SRTP)}},
  journal      = {{RFC}},
  volume       = {5669},
  pages        = {1--13},
  year         = {2010},
  url          = {https://doi.org/10.17487/RFC5669},
  doi          = {10.17487/RFC5669},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5669.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ParkLY09,
  author       = {Haeryong Park and
                  Seongan Lim and
                  Ikkwon Yie},
  title        = {A privacy problem on Hu-Huang's proxy key generation protocol},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {2},
  pages        = {480--483},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.06.003},
  doi          = {10.1016/J.CSI.2008.06.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/ParkLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ParkLYKS09,
  author       = {Haeryong Park and
                  Seongan Lim and
                  Ikkwon Yie and
                  Kitae Kim and
                  Junghwan Song},
  title        = {Strong unforgeability in group signature schemes},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {4},
  pages        = {856--862},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.09.019},
  doi          = {10.1016/J.CSI.2008.09.019},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/ParkLYKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Park09c,
  author       = {Haeryong Park},
  title        = {Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute
                  Authentication Scheme},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {9},
  pages        = {2946--2947},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.2946},
  doi          = {10.1587/TRANSCOM.E92.B.2946},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Park09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/JeongCLLSPK09,
  author       = {Kitae Jeong and
                  Joongeun Choi and
                  Yuseop Lee and
                  Changhoon Lee and
                  Jaechul Sung and
                  Haeryong Park and
                  Yeonjung Kang},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Update on {SEED:} {SEED-192/256}},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_1},
  doi          = {10.1007/978-3-642-02617-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/JeongCLLSPK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/LeeHSP09,
  author       = {Jesang Lee and
                  Seokhie Hong and
                  Jaechul Sung and
                  Haeryong Park},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {A New Double-Block-Length Hash Function Using Feistel Structure},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {11--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_2},
  doi          = {10.1007/978-3-642-02617-1\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/LeeHSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5636,
  author       = {Sang Hwan Park and
                  Haeryong Park and
                  Yoojae Won and
                  Jaeil Lee and
                  Stephen T. Kent},
  title        = {Traceable Anonymous Certificate},
  journal      = {{RFC}},
  volume       = {5636},
  pages        = {1--31},
  year         = {2009},
  url          = {https://doi.org/10.17487/RFC5636},
  doi          = {10.17487/RFC5636},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5636.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ParkCA08,
  author       = {Haeryong Park and
                  Kilsoo Chun and
                  Seungho Ahn},
  title        = {Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem
                  and Its Improvement},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {91-B},
  number       = {3},
  pages        = {900--903},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietcom/e91-b.3.900},
  doi          = {10.1093/IETCOM/E91-B.3.900},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ParkCA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChangNLSHLPC08,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Jesang Lee and
                  Jaechul Sung and
                  Seokhie Hong and
                  Jongin Lim and
                  Haeryong Park and
                  Kilsoo Chun},
  title        = {Compression Function Design Principles Supporting Variable Output
                  Lengths from a Single Small Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2607--2614},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2607},
  doi          = {10.1093/IETFEC/E91-A.9.2607},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChangNLSHLPC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/KangPCS08,
  author       = {Yeonjung Kang and
                  Haeryong Park and
                  Kilsoo Chun and
                  Junghwan Song},
  editor       = {Shahram Latifi},
  title        = {A Digital Identity Management Service Model},
  booktitle    = {Fifth International Conference on Information Technology: New Generations
                  {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}},
  pages        = {599--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ITNG.2008.261},
  doi          = {10.1109/ITNG.2008.261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/KangPCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ParkLYKCL07,
  author       = {Haeryong Park and
                  Seongan Lim and
                  Ikkwon Yie and
                  Hyun Kim and
                  Kilsoo Chun and
                  Jaeil Lee},
  editor       = {Parimala Thulasiraman and
                  Xubin He and
                  Tony Li Xu and
                  Mieso K. Denko and
                  Ruppa K. Thulasiram and
                  Laurence Tianruo Yang},
  title        = {An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor
                  Networks},
  booktitle    = {Frontiers of High Performance Computing and Networking {ISPA} 2007
                  Workshops, {ISPA} 2007 International Workshops SSDSN, UPWN, WISH,
                  SGC, ParDMCom, HiPCoMB, and {IST-AWSN} Niagara Falls, Canada, August
                  28 - September 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4743},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74767-3\_7},
  doi          = {10.1007/978-3-540-74767-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/ParkLYKCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/ParkKCLLY07,
  author       = {Haeryong Park and
                  Hyun Kim and
                  Kilsoo Chun and
                  Jaeil Lee and
                  Seongan Lim and
                  Ikkwon Yie},
  editor       = {Shahram Latifi},
  title        = {Untraceability of Group Signature Schemes based on Bilinear Mapping
                  and Their Improvement},
  booktitle    = {Fourth International Conference on Information Technology: New Generations
                  {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}},
  pages        = {747--753},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITNG.2007.199},
  doi          = {10.1109/ITNG.2007.199},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/ParkKCLLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/JuKLPC06,
  author       = {Hak Soo Ju and
                  Dae Youb Kim and
                  Dong Hoon Lee and
                  Haeryong Park and
                  Kilsoo Chun},
  editor       = {Xiaofang Zhou and
                  Jianzhong Li and
                  Heng Tao Shen and
                  Masaru Kitsuregawa and
                  Yanchun Zhang},
  title        = {Modified ID-Based Threshold Decryption and Its Application to Mediated
                  ID-Based Encryption},
  booktitle    = {Frontiers of {WWW} Research and Development - APWeb 2006, 8th Asia-Pacific
                  Web Conference, Harbin, China, January 16-18, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3841},
  pages        = {720--725},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11610113\_64},
  doi          = {10.1007/11610113\_64},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/JuKLPC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ParkCLLYC06,
  author       = {Haeryong Park and
                  Zhengjun Cao and
                  Lihua Liu and
                  Seongan Lim and
                  Ikkwon Yie and
                  Kilsoo Chun},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings
                  in {CISC} '05},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_1},
  doi          = {10.1007/11937807\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ParkCLLYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ParkJCLAN06,
  author       = {Haeryong Park and
                  Hak Soo Ju and
                  Kilsoo Chun and
                  Jaeil Lee and
                  Seungho Ahn and
                  Bongnam Noh},
  title        = {The Algorithm to Enhance the Security of Multi-Agent in Distributed
                  Computing Environment},
  booktitle    = {12th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2006, Minneapolis, Minnesota, USA, July 12-15, 2006},
  pages        = {55--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICPADS.2006.104},
  doi          = {10.1109/ICPADS.2006.104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ParkJCLAN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ParkCA05,
  author       = {Haeryong Park and
                  Kilsoo Chun and
                  Seungho Ahn},
  title        = {The Security Requirement for off-line E-cash system based on {IC}
                  Card},
  booktitle    = {11th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages        = {260--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPADS.2005.279},
  doi          = {10.1109/ICPADS.2005.279},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ParkCA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/KimKPKW03,
  author       = {Jeeyeon Kim and
                  Hyunjo Kwon and
                  Haeryong Park and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Juan Manuel Cueva Lovelle and
                  Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and
                  Luis Joyanes Aguilar and
                  Jos{\'{e}} Emilio Labra Gayo and
                  Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z},
  title        = {An Improvement of VeriSign's Key Roaming Service Protocol},
  booktitle    = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain,
                  July 14-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2722},
  pages        = {281--288},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45068-8\_53},
  doi          = {10.1007/3-540-45068-8\_53},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/KimKPKW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics