BibTeX records: Seong-Min Hong 0001

download as .bib file

@article{DBLP:journals/access/CheonHHKKKSSS18,
  author    = {Jung Hee Cheon and
               Kyoohyung Han and
               Seong{-}Min Hong and
               Hyoun Jin Kim and
               Junsoo Kim and
               Suseong Kim and
               Hosung Seo and
               Hyungbo Shim and
               Yongsoo Song},
  title     = {Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated
               Encryption},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {24325--24339},
  year      = {2018}
}
@article{DBLP:journals/ipl/ChungHKHY09,
  author    = {Byungchun Chung and
               Junbeom Hur and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Improved batch exponentiation},
  journal   = {Inf. Process. Lett.},
  volume    = {109},
  number    = {15},
  pages     = {832--837},
  year      = {2009}
}
@article{DBLP:journals/ijnsec/LeeKLHY07,
  author    = {Jaewon Lee and
               Heeyoul Kim and
               Younho Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Parallelized Scalar Multiplication on Elliptic Curves Defined over
               Optimal Extension Field},
  journal   = {I. J. Network Security},
  volume    = {4},
  number    = {1},
  pages     = {99--106},
  year      = {2007}
}
@article{DBLP:journals/ieicet/LeePKHY06,
  author    = {Younho Lee and
               Yongsu Park and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Rogue Public Key Registration Attack and the Importance of 'Proof
               of Possession' in the {PKI} Environment},
  journal   = {{IEICE} Trans. Inf. Syst.},
  volume    = {89-D},
  number    = {8},
  pages     = {2452--2455},
  year      = {2006}
}
@article{DBLP:journals/ijnsec/LeeKHY06,
  author    = {Younho Lee and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains},
  journal   = {I. J. Network Security},
  volume    = {2},
  number    = {1},
  pages     = {34--40},
  year      = {2006}
}
@article{DBLP:journals/ijnsec/KimLHY06,
  author    = {Heeyoul Kim and
               Younho Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Active Trial-and-error Attack on {SASC} Protocols},
  journal   = {I. J. Network Security},
  volume    = {2},
  number    = {2},
  pages     = {105--110},
  year      = {2006}
}
@article{DBLP:journals/ieicet/LeeHY05,
  author    = {Jaewon Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Securing Mobile Agents by Integrity-Based Encryption},
  journal   = {{IEICE} Trans. Inf. Syst.},
  volume    = {88-D},
  number    = {9},
  pages     = {2102--2104},
  year      = {2005}
}
@inproceedings{DBLP:conf/icisc/HurLHY05,
  author    = {Junbeom Hur and
               Younho Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Trust Management for Resilient Wireless Sensor Networks},
  booktitle = {{ICISC}},
  series    = {Lecture Notes in Computer Science},
  volume    = {3935},
  pages     = {56--68},
  publisher = {Springer},
  year      = {2005}
}
@inproceedings{DBLP:conf/itcc/KimHYC05,
  author    = {Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon and
               Jung Wan Cho},
  title     = {Secure Group Communication with Multiplicative One-way Functions},
  booktitle = {{ITCC} {(1)}},
  pages     = {685--690},
  publisher = {{IEEE} Computer Society},
  year      = {2005}
}
@article{DBLP:journals/comcom/HongLPCY00,
  author    = {Seong{-}Min Hong and
               Seungwon Lee and
               Yongsoo Park and
               Yookun Cho and
               Hyunsoo Yoon},
  title     = {On the construction of a powerful distributed authentication server
               without additional key management},
  journal   = {Comput. Commun.},
  volume    = {23},
  number    = {17},
  pages     = {1638--1644},
  year      = {2000}
}
@inproceedings{DBLP:conf/acisp/LeeHYC99,
  author    = {Seungwon Lee and
               Seong{-}Min Hong and
               Hyunsoo Yoon and
               Yookun Cho},
  title     = {Accelerating Key Establishment Protocols for Mobile Communication},
  booktitle = {{ACISP}},
  series    = {Lecture Notes in Computer Science},
  volume    = {1587},
  pages     = {51--63},
  publisher = {Springer},
  year      = {1999}
}
@inproceedings{DBLP:conf/icisc/HongSLY98,
  author    = {Seong{-}Min Hong and
               Jun{-}Bum Shin and
               H. Lee{-}Kwang and
               Hyunsoo Yoon},
  title     = {A new appraoch to server-aided secret computation},
  booktitle = {{ICISC}},
  pages     = {33--45},
  publisher = {Korea Institute of Information Security and Cryptology {(KIISC)}},
  year      = {1998}
}
@inproceedings{DBLP:conf/eurocrypt/HongOY96,
  author    = {Seong{-}Min Hong and
               Sang{-}Yeop Oh and
               Hyunsoo Yoon},
  title     = {New Modular Multiplication Algorithms for Fast Modular Exponentiation},
  booktitle = {{EUROCRYPT}},
  series    = {Lecture Notes in Computer Science},
  volume    = {1070},
  pages     = {166--177},
  publisher = {Springer},
  year      = {1996}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics