Seonho Choi

According to our database1, Seonho Choi authored at least 20 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

2022
Hardware Watermarking for Finite State Machines, with Symmetric Circuit Encryption.
CoRR, 2022

2019
Power Surge and Clock Hiccup Side-Channel Watermarking Approach for Finite State Machines.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2016
Identification of IP control units by state encoding and side channel verification.
Microprocess. Microsystems, 2016

A multi-level intrusion detection method for abnormal network behaviors.
J. Netw. Comput. Appl., 2016

2015
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks.
Secur. Commun. Networks, 2015

Designing an Internet Traffic Predictive Model by Applying a Signal Processing Method.
J. Netw. Syst. Manag., 2015

Identification of IP Control Units by State Encoding.
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015

2014
FSM watermarks based on ordering of flip flops.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

Designing a two-level monitoring method to detect network abnormal behaviors.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Cloud-based user authentication with geo-temporal queries on smartphones.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2012
An efficient locking and unlocking method of sequential systems.
Proceedings of the Research in Applied Computation Symposium, 2012

2011
A unified design method utilizing decomposability and composability for secure systems.
Proceedings of the Research in Applied Computation Symposium, 2011

The investigation of the structural properties of machines for the design of secure and trustworthy systems.
Proceedings of the Research in Applied Computation Symposium, 2011

2006
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

2002
Temporally enhanced erasure codes for reliable communication protocols.
Comput. Networks, 2002

2000
Dynamic Dispatching of Cyclic Real-Time Tasks with Relative Timing Constraints.
Real Time Syst., 2000

Scheduling of Real-Time Tasks with Complex Constraints.
Proceedings of the Performance Evaluation: Origins and Directions, 2000

1998
End-to-End Optimization in Heterogeneous Distributed Real-Time Systems.
Proceedings of the Languages, 1998


  Loading...