Yong Ho Hwang
According to our database1,
Yong Ho Hwang
authored at least 36 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2015
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015
2014
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014
2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. Univers. Comput. Sci., 2008
IEICE Trans. Inf. Syst., 2008
2007
Proceedings of the Advances in Multimedia Information Processing, 2007
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System.
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Advances in Visual Computing, Third International Symposium, 2007
2006
Proceedings of the Rough Sets and Current Trends in Computing, 2006
Quantitative Measure of Inlier Distributions and Contour Matching for Omnidirectional Camera Calibration.
Proceedings of the Advances in Multimedia Information Processing, 2006
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Advances in Intelligent Computing, 2005
Proceedings of the Image and Video Retrieval, 4th International Conference, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Using Factorization Algorithm for 3D Reconstruction over Long Un-calibrated Sequences.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004
An Improved ICP Algorithm Based on the Sensor Projection for Automatic 3D Registration.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004
Proceedings of the 17th International Conference on Pattern Recognition, 2004
Proceedings of the Computational Science and Its Applications, 2004
Bit-Serial Multipliers for Exponentiation and Division in GF(2<sup>m</sup>) Using Irreducible AOP.
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003