Haeryong Park

According to our database1, Haeryong Park authored at least 23 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
Secur. Commun. Networks, 2018

2015
Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis.
Int. J. Distributed Sens. Networks, 2015

2014
Malware Similarity Analysis using API Sequence Alignments.
J. Internet Serv. Inf. Secur., 2014

Development of Indicators for Information Security Level Assessment of VoIP Service Providers.
KSII Trans. Internet Inf. Syst., 2014

2011
A Method of Finding Bad Signatures in an RSA-Type Batch Verification.
Informatica, 2011

2010
The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP).
RFC, August, 2010

Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme.
IEICE Trans. Commun., 2010

2009
Traceable Anonymous Certificate.
RFC, August, 2009

Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme.
IEICE Trans. Commun., 2009

Strong unforgeability in group signature schemes.
Comput. Stand. Interfaces, 2009

A privacy problem on Hu-Huang's proxy key generation protocol.
Comput. Stand. Interfaces, 2009

A New Double-Block-Length Hash Function Using Feistel Structure.
Proceedings of the Advances in Information Security and Assurance, 2009

Update on SEED: SEED-192/256.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement.
IEICE Trans. Commun., 2008

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Digital Identity Management Service Model.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

2006
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
The Security Requirement for off-line E-cash system based on IC Card.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2003
An Improvement of VeriSign's Key Roaming Service Protocol.
Proceedings of the Web Engineering, International Conference, 2003


  Loading...