Dowon Hong
Orcid: 0000-0001-9690-5055
According to our database1,
Dowon Hong
authored at least 76 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks.
IEEE Internet Things J., February, 2023
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm.
IEEE Access, 2023
2022
Int. J. Inf. Sec., 2022
2021
Secur. Commun. Networks, 2021
Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack.
IEEE Access, 2021
2020
Efficient Bit-Parallel Multiplier for All Trinomials Based on n-Term Karatsuba Algorithm.
IEEE Access, 2020
Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm.
IEEE Access, 2020
2019
An Attack-Based Evaluation Method for Differentially Private Learning Against Model Inversion Attack.
IEEE Access, 2019
Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm.
IEEE Access, 2019
2018
Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product.
IEEE Trans. Computers, 2018
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments.
Secur. Commun. Networks, 2018
Inf. Process. Lett., 2018
Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
2017
New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach.
IEEE Trans. Computers, 2017
2016
Symmetric searchable encryption with efficient range query using multi-layered linked chains.
J. Supercomput., 2016
IEEE Trans. Computers, 2016
Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis.
Integr., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
2015
Low Complexity Multiplier Based on Dickson Basis Using Efficient Toeplitz Matrix-Vector Product.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Commun., 2015
2014
IEEE Trans. Computers, 2014
Integr., 2014
Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR.
IEICE Trans. Commun., 2014
Bit-Parallel Cubing Computation over <i>GF</i>(3<i><sup>m</sup></i>) for Irreducible Trinomials.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
Inf. Sci., 2013
Inf. Process. Lett., 2013
Fast Bit-Parallel Polynomial Basis Multiplier for <i>GF</i>(2<sup><i>m</i></sup>) Defined by Pentanomials Using Weakly Dual Basis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
2012
Scalable Privacy-Preserving <i>t</i>-Repetition Protocol with Distributed Medical Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEEE Commun. Lett., 2012
Signcryption with fast online signing and short signcryptext for secure and private mobile communication.
Sci. China Inf. Sci., 2012
2011
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst., 2011
KSII Trans. Internet Inf. Syst., 2011
KSII Trans. Internet Inf. Syst., 2011
Proceedings of the Security Technology, 2011
2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010
CoRR, 2010
Sci. China Inf. Sci., 2010
2009
KSII Trans. Internet Inf. Syst., 2009
KSII Trans. Internet Inf. Syst., 2009
IEICE Trans. Inf. Syst., 2009
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
CoRR, 2009
Comput. Commun., 2009
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Digit. Investig., 2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Forensic Data Acquisition from Cell Phones using JTAG Interface.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations.
J. Inf. Process. Syst., 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis.
IEEE Trans. Computers, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Efficient Exponentiation in <i>GF</i>(<i>p</i><sup><i>m</i></sup>) Using the Frobenius Map.
Proceedings of the Computational Science and Its Applications, 2006
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation.
IEEE Trans. Computers, 2005
IEEE Commun. Lett., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
2004
Proceedings of the Information Security and Cryptology, 2004
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module.
Proceedings of the International Conference on Security and Management, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001