Chanil Park

According to our database1, Chanil Park authored at least 15 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016

2012
Fine-grained user access control in ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2012

Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012

Privacy-preserving identity-based broadcast encryption.
Inf. Fusion, 2012

2011
Implementation of Bilinear Pairings over Elliptic Curves with Embedding Degree 24.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

2010
Self-healing key distribution scheme with long service time.
IEICE Electron. Express, 2010

Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Comput. Math. Appl., 2010

An efficient identity-based proxy signcryption for secure broadcast.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2009

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009

2007
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.
Proceedings of the Advances in Information and Computer Security, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Real-time analysis of intrusion detection alerts via correlation.
Comput. Secur., 2006

Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006


  Loading...