Haeryong Park
According to our database1,
Haeryong Park
authored at least 23 papers
between 2003 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
2018
0
1
2
3
4
5
6
7
1
1
2
1
2
4
2
2
1
2
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
Secur. Commun. Networks, 2018
2015
Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis.
Int. J. Distributed Sens. Networks, 2015
2014
J. Internet Serv. Inf. Secur., 2014
Development of Indicators for Information Security Level Assessment of VoIP Service Providers.
KSII Trans. Internet Inf. Syst., 2014
2011
Informatica, 2011
2010
The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP).
RFC, August, 2010
Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme.
IEICE Trans. Commun., 2010
2009
Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme.
IEICE Trans. Commun., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement.
IEICE Trans. Commun., 2008
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
2007
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
2006
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption.
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
2003
Proceedings of the Web Engineering, International Conference, 2003