Choonsik Park

According to our database1, Choonsik Park authored at least 16 papers between 1993 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Privacy Level Indicating Data Leakage Prevention System.
KSII Trans. Internet Inf. Syst., 2013

2008
The Vulnerabilities Analysis of Fuzzy Vault Using Password.
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008

2005
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction.
Proceedings of the Information Networking, 2005

An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
Proceedings of the Computational Science and Its Applications, 2005

Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2004
Adaptation Enhanced Mechanism for Web Survivability.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

2001
New Public Key Cryptosystem Using Finite Non Abelian Groups.
Proceedings of the Advances in Cryptology, 2001

2000
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures.
Proceedings of the Information Security and Cryptology, 2000

New Public-Key Cryptosystem Using Braid Groups.
Proceedings of the Advances in Cryptology, 2000

1999
Global Avalanche Characteristics and Propagation Criterion of Balanced Boolean Functions.
Inf. Process. Lett., 1999

On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999

S-boxes with Controllable Nonlinearity.
Proceedings of the Advances in Cryptology, 1999

1998
How to construct balanced Boolean functions with good global avalanche characteristics.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1996
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

1993
On Key Distribution and Authentication in Mobile Radio Networks.
Proceedings of the Advances in Cryptology, 1993

Efficient Anonymous Channel and All/Nothing Election Scheme.
Proceedings of the Advances in Cryptology, 1993


  Loading...