Cheol-Min Park
Orcid: 0000-0001-5257-7723
According to our database1,
Cheol-Min Park
authored at least 32 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Ecological drivers for the absence of task shifting in termite-tunneling activity: A simulation study.
Biosyst., 2025
A Novel Mixing Index Based on Directional Branch Length Similarity Entropy on Delaunay Networks.
IEEE Access, 2025
IEEE Access, 2025
2024
The effect of avian eggshell membrane structure on microbial penetration: A simulation study.
Biosyst., 2024
A New Perspective on Shape and Distribution: Branch Length Similarity Entropy Approach.
IEEE Access, 2024
2023
Exploring the effects of high curvature section distribution and density in termite tunnels on food transport efficiency: A simulation study.
Biosyst., September, 2023
2022
Characteristics of Peak and Cliff in Branch Length Similarity Entropy Profiles for Binary Time-Series and Their Application.
IEEE Access, 2022
2021
Entropy, 2021
A New Measure to Characterize the Self-Similarity of Binary Time Series and its Application.
IEEE Access, 2021
2020
IEEE Internet Things J., 2020
A New Measure to Characterize the Degree of Self-Similarity of a Shape and Its Applicability.
Entropy, 2020
2018
Desmoid-type fibromatosis mimicking cystic retroperitoneal mass: case report and literature review.
BMC Medical Imaging, 2018
2017
Finite Fields Their Appl., 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2015
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
Lite-Rainbow: Lightweight Signature Schemes Based on Multivariate Quadratic Equations and Their Secure Implementations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
2014
Equivalent public keys and a key substitution attack on the schemes from vector decomposition.
Secur. Commun. Networks, 2014
Appl. Algebra Eng. Commun. Comput., 2014
2013
Simple and exact formula for minimum loop length in Ate i pairing based on Brezing-Weng curves.
Des. Codes Cryptogr., 2013
EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks.
Ad Hoc Networks, 2013
2012
2011
Simple and Exact Formula for Minimum Loop Length in Ate<sub>i</sub> Pairing based on Brezing-Weng Curves.
IACR Cryptol. ePrint Arch., 2011
Appl. Algebra Eng. Commun. Comput., 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
2009
Proceedings of the Pairing-Based Cryptography, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005