Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Haeryong Park
@article{DBLP:journals/scn/ParkSKPK18, author = {Taehwan Park and Hwajeong Seo and Junsub Kim and Haeryong Park and Howon Kim}, title = {Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern {ARM} Processor}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7012056:1--7012056:10}, year = {2018}, url = {https://doi.org/10.1155/2018/7012056}, doi = {10.1155/2018/7012056}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ParkSKPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LeeCPK15, author = {TaeJin Lee and Hesun Cho and Haeryong Park and Jin Kwak}, title = {Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {530250:1--530250:12}, year = {2015}, url = {https://doi.org/10.1155/2015/530250}, doi = {10.1155/2015/530250}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/LeeCPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YoonPY14, author = {Seokung Yoon and Haeryong Park and Hyeong Seon Yoo}, title = {Development of Indicators for Information Security Level Assessment of VoIP Service Providers}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {2}, pages = {634--645}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.02.018}, doi = {10.3837/TIIS.2014.02.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YoonPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ChoKSPCI14, author = {In Kyeom Cho and TaeGuen Kim and Yu Jin Shim and Haeryong Park and Bomin Choi and Eul Gyu Im}, title = {Malware Similarity Analysis using {API} Sequence Alignments}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {4}, pages = {103--114}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.11.31.103}, doi = {10.22667/JISIS.2014.11.31.103}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ChoKSPCI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/KimYLP11, author = {Kitae Kim and Ikkwon Yie and Seongan Lim and Haeryong Park}, title = {A Method of Finding Bad Signatures in an RSA-Type Batch Verification}, journal = {Informatica}, volume = {22}, number = {2}, pages = {189--201}, year = {2011}, url = {http://content.iospress.com/articles/informatica/inf22-2-03}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/KimYLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Park10b, author = {Haeryong Park}, title = {Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme}, journal = {{IEICE} Trans. Commun.}, volume = {93-B}, number = {4}, pages = {1013--1015}, year = {2010}, url = {https://doi.org/10.1587/transcom.E93.B.1013}, doi = {10.1587/TRANSCOM.E93.B.1013}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Park10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5669, author = {Seokung Yoon and Joongman Kim and Haeryong Park and Hyuncheol Jeong and Yoojae Won}, title = {The {SEED} Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol {(SRTP)}}, journal = {{RFC}}, volume = {5669}, pages = {1--13}, year = {2010}, url = {https://doi.org/10.17487/RFC5669}, doi = {10.17487/RFC5669}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5669.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ParkLY09, author = {Haeryong Park and Seongan Lim and Ikkwon Yie}, title = {A privacy problem on Hu-Huang's proxy key generation protocol}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {2}, pages = {480--483}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.06.003}, doi = {10.1016/J.CSI.2008.06.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ParkLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ParkLYKS09, author = {Haeryong Park and Seongan Lim and Ikkwon Yie and Kitae Kim and Junghwan Song}, title = {Strong unforgeability in group signature schemes}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {4}, pages = {856--862}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.09.019}, doi = {10.1016/J.CSI.2008.09.019}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ParkLYKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Park09c, author = {Haeryong Park}, title = {Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {9}, pages = {2946--2947}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.2946}, doi = {10.1587/TRANSCOM.E92.B.2946}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Park09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/JeongCLLSPK09, author = {Kitae Jeong and Joongeun Choi and Yuseop Lee and Changhoon Lee and Jaechul Sung and Haeryong Park and Yeonjung Kang}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Update on {SEED:} {SEED-192/256}}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {1--10}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_1}, doi = {10.1007/978-3-642-02617-1\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/JeongCLLSPK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/LeeHSP09, author = {Jesang Lee and Seokhie Hong and Jaechul Sung and Haeryong Park}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {A New Double-Block-Length Hash Function Using Feistel Structure}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {11--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_2}, doi = {10.1007/978-3-642-02617-1\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/LeeHSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5636, author = {Sang Hwan Park and Haeryong Park and Yoojae Won and Jaeil Lee and Stephen T. Kent}, title = {Traceable Anonymous Certificate}, journal = {{RFC}}, volume = {5636}, pages = {1--31}, year = {2009}, url = {https://doi.org/10.17487/RFC5636}, doi = {10.17487/RFC5636}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5636.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ParkCA08, author = {Haeryong Park and Kilsoo Chun and Seungho Ahn}, title = {Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement}, journal = {{IEICE} Trans. Commun.}, volume = {91-B}, number = {3}, pages = {900--903}, year = {2008}, url = {https://doi.org/10.1093/ietcom/e91-b.3.900}, doi = {10.1093/IETCOM/E91-B.3.900}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ParkCA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChangNLSHLPC08, author = {Donghoon Chang and Mridul Nandi and Jesang Lee and Jaechul Sung and Seokhie Hong and Jongin Lim and Haeryong Park and Kilsoo Chun}, title = {Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2607--2614}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2607}, doi = {10.1093/IETFEC/E91-A.9.2607}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ChangNLSHLPC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/KangPCS08, author = {Yeonjung Kang and Haeryong Park and Kilsoo Chun and Junghwan Song}, editor = {Shahram Latifi}, title = {A Digital Identity Management Service Model}, booktitle = {Fifth International Conference on Information Technology: New Generations {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}}, pages = {599--602}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ITNG.2008.261}, doi = {10.1109/ITNG.2008.261}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/KangPCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ParkLYKCL07, author = {Haeryong Park and Seongan Lim and Ikkwon Yie and Hyun Kim and Kilsoo Chun and Jaeil Lee}, editor = {Parimala Thulasiraman and Xubin He and Tony Li Xu and Mieso K. Denko and Ruppa K. Thulasiram and Laurence Tianruo Yang}, title = {An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks}, booktitle = {Frontiers of High Performance Computing and Networking {ISPA} 2007 Workshops, {ISPA} 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and {IST-AWSN} Niagara Falls, Canada, August 28 - September 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4743}, pages = {60--68}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74767-3\_7}, doi = {10.1007/978-3-540-74767-3\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispa/ParkLYKCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/ParkKCLLY07, author = {Haeryong Park and Hyun Kim and Kilsoo Chun and Jaeil Lee and Seongan Lim and Ikkwon Yie}, editor = {Shahram Latifi}, title = {Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement}, booktitle = {Fourth International Conference on Information Technology: New Generations {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}}, pages = {747--753}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ITNG.2007.199}, doi = {10.1109/ITNG.2007.199}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/ParkKCLLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/JuKLPC06, author = {Hak Soo Ju and Dae Youb Kim and Dong Hoon Lee and Haeryong Park and Kilsoo Chun}, editor = {Xiaofang Zhou and Jianzhong Li and Heng Tao Shen and Masaru Kitsuregawa and Yanchun Zhang}, title = {Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption}, booktitle = {Frontiers of {WWW} Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3841}, pages = {720--725}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11610113\_64}, doi = {10.1007/11610113\_64}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apweb/JuKLPC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ParkCLLYC06, author = {Haeryong Park and Zhengjun Cao and Lihua Liu and Seongan Lim and Ikkwon Yie and Kilsoo Chun}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in {CISC} '05}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {1--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_1}, doi = {10.1007/11937807\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ParkCLLYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ParkJCLAN06, author = {Haeryong Park and Hak Soo Ju and Kilsoo Chun and Jaeil Lee and Seungho Ahn and Bongnam Noh}, title = {The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment}, booktitle = {12th International Conference on Parallel and Distributed Systems, {ICPADS} 2006, Minneapolis, Minnesota, USA, July 12-15, 2006}, pages = {55--60}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICPADS.2006.104}, doi = {10.1109/ICPADS.2006.104}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ParkJCLAN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ParkCA05, author = {Haeryong Park and Kilsoo Chun and Seungho Ahn}, title = {The Security Requirement for off-line E-cash system based on {IC} Card}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {260--264}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.279}, doi = {10.1109/ICPADS.2005.279}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ParkCA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/KimKPKW03, author = {Jeeyeon Kim and Hyunjo Kwon and Haeryong Park and Seungjoo Kim and Dongho Won}, editor = {Juan Manuel Cueva Lovelle and Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and Luis Joyanes Aguilar and Jos{\'{e}} Emilio Labra Gayo and Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z}, title = {An Improvement of VeriSign's Key Roaming Service Protocol}, booktitle = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain, July 14-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2722}, pages = {281--288}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45068-8\_53}, doi = {10.1007/3-540-45068-8\_53}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwe/KimKPKW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.