Howon Kim


Ontology type: schema:Person     


Person Info

NAME

Howon

SURNAME

Kim

Publications in SciGraph latest 50 shown

  • 2018-08 Erratum to: Secure IoT framework and 2D architecture for End-To-End security in THE JOURNAL OF SUPERCOMPUTING
  • 2018 Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2017
  • 2018 ARM/NEON Co-design of Multiplication/Squaring in INFORMATION SECURITY APPLICATIONS
  • 2016-11 A fast ARX model-based image encryption scheme in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2016 Compact Implementations of LSH in INFORMATION SECURITY APPLICATIONS
  • 2016 Open Sesame! Hacking the Password in INFORMATION SECURITY APPLICATIONS
  • 2016 Secure Binary Field Multiplication in INFORMATION SECURITY APPLICATIONS
  • 2015 Efficient Ring-LWE Encryption on 8-Bit AVR Processors in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS -- CHES 2015
  • 2015 Improved Modular Multiplication for Optimal Prime Fields in INFORMATION SECURITY APPLICATIONS
  • 2015 The Unified Hardware Design for GCM and SGCM in INFORMATION SECURITY APPLICATIONS
  • 2014 Parallel Implementations of LEA in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2013 Dynamic Tag Identity-Based Encryption Scheme for Logistic Systems in DYNAMICS IN LOGISTICS
  • 2012 Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors in INFORMATION SECURITY APPLICATIONS
  • 2008 A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor in HOME NETWORKING
  • 2008 Multilateral Approaches to the Mobile RFID Security Problem Using Web Service in PROGRESS IN WWW RESEARCH AND DEVELOPMENT
  • 2007 Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2007 Enhanced Doubling Attacks on Signed-All-Bits Set Recoding in INFORMATION SECURITY THEORY AND PRACTICES. SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS
  • 2007 SPA Countermeasure Based on Unsigned Left-to-Right Recodings in AUTONOMIC AND TRUSTED COMPUTING
  • 2007 Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols in INFORMATION SECURITY APPLICATIONS
  • 2006 A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach in KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2006 XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing in COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006
  • 2006 Security Enhancement Mechanism for Ad-Hoc OLSR Protocol in INFORMATION NETWORKING. ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS
  • 2005 Open Location-Based Service Using Secure Middleware Infrastructure in Web Services in COMPUTATIONAL SCIENCE AND ITS APPLICATIONS – ICCSA 2005
  • 2005 A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control in EMBEDDED AND UBIQUITOUS COMPUTING – EUC 2005 WORKSHOPS
  • 2004 Design of Sub-session Based Accounting System for Different Service Level of Mobile IP Roaming User in TELECOMMUNICATIONS AND NETWORKING - ICT 2004
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1405.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.010610076315.82'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.010610076315.82'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.010610076315.82'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.010610076315.82'


     




    Preview window. Press ESC to close (or click here)


    ...