Sunghyuck Hong
Orcid: 0000-0002-5923-1191
According to our database1,
Sunghyuck Hong
authored at least 21 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
P2P networking based internet of things (IoT) sensor node authentication by Blockchain.
Peer-to-Peer Netw. Appl., 2020
2019
Int. J. Netw. Secur., 2019
2018
Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks.
Clust. Comput., 2018
A novel secure and efficient hash function with extra padding against rainbow table attacks.
Clust. Comput., 2018
2017
J. Comput. Virol. Hacking Tech., 2017
2016
J. Comput. Virol. Hacking Tech., 2016
2015
J. Comput. Virol. Hacking Tech., 2015
2014
Wirel. Pers. Commun., 2014
J. Syst. Inf. Technol., 2014
2013
KSII Trans. Internet Inf. Syst., 2013
2011
Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey.
KSII Trans. Internet Inf. Syst., 2011
2010
Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
KSII Trans. Internet Inf. Syst., 2009
A Secure Certificate for Secure Group Communication.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Secure Authentication in Virtual Community by Using Media Access Control address (MAC).
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Design and Performance Analysis of an Enhanced Group Key Generation Protocol.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Enhanced Group Key Generation Protocol.
Proceedings of the 2006 International Conference on Security & Management, 2006