Howon Kim


Ontology type: schema:Person     


Person Info

NAME

Howon

SURNAME

Kim

Publications in SciGraph latest 50 shown

  • 2018-08 Erratum to: Secure IoT framework and 2D architecture for End-To-End security in THE JOURNAL OF SUPERCOMPUTING
  • 2018-08 Secure IoT framework and 2D architecture for End-To-End security in THE JOURNAL OF SUPERCOMPUTING
  • 2018 Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited in INFORMATION SECURITY APPLICATIONS
  • 2018 ARM/NEON Co-design of Multiplication/Squaring in INFORMATION SECURITY APPLICATIONS
  • 2018 Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2017
  • 2018 Parallel Implementations of SIMON and SPECK, Revisited in INFORMATION SECURITY APPLICATIONS
  • 2017 Parallel Implementations of LEA, Revisited in INFORMATION SECURITY APPLICATIONS
  • 2017 Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward in INFORMATION SECURITY APPLICATIONS
  • 2017 Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform in RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY
  • 2017 Slowloris DoS Countermeasure over WebSocket in INFORMATION SECURITY APPLICATIONS
  • 2016-11 A fast ARX model-based image encryption scheme in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2016-03 A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges in JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
  • 2016 Compact Implementations of LSH in INFORMATION SECURITY APPLICATIONS
  • 2016 Open Sesame! Hacking the Password in INFORMATION SECURITY APPLICATIONS
  • 2016 Secure Binary Field Multiplication in INFORMATION SECURITY APPLICATIONS
  • 2016 Compact Implementations of LEA Block Cipher for Low-End Microprocessors in INFORMATION SECURITY APPLICATIONS
  • 2016 Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization in INFORMATION SECURITY APPLICATIONS
  • 2016 Faster ECC over $$\mathbb {F}_{2^{521}-1}$$ F 2 521 - 1 (feat. NEON) in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2015
  • 2015 Montgomery Modular Multiplication on ARM-NEON Revisited in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2014
  • 2015 Efficient Ring-LWE Encryption on 8-Bit AVR Processors in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS -- CHES 2015
  • 2015 Improved Modular Multiplication for Optimal Prime Fields in INFORMATION SECURITY APPLICATIONS
  • 2015 The Unified Hardware Design for GCM and SGCM in INFORMATION SECURITY APPLICATIONS
  • 2015 Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors in INFORMATION AND COMMUNICATIONS SECURITY
  • 2014 Parallel Implementations of LEA in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2014 Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA in FUTURE DATA AND SECURITY ENGINEERING
  • 2013 Dynamic Tag Identity-Based Encryption Scheme for Logistic Systems in DYNAMICS IN LOGISTICS
  • 2013 Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes in INFORMATION AND COMMUNICATIONS SECURITY
  • 2013 Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2013
  • 2012 Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors in INFORMATION SECURITY APPLICATIONS
  • 2008 A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor in HOME NETWORKING
  • 2008 Multilateral Approaches to the Mobile RFID Security Problem Using Web Service in PROGRESS IN WWW RESEARCH AND DEVELOPMENT
  • 2007 Compressed XTR in ROBOCUP-97: ROBOT SOCCER WORLD CUP I
  • 2007 Enhanced Doubling Attacks on Signed-All-Bits Set Recoding in INFORMATION SECURITY THEORY AND PRACTICES. SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS
  • 2007 Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2007 SPA Countermeasure Based on Unsigned Left-to-Right Recodings in AUTONOMIC AND TRUSTED COMPUTING
  • 2007 Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols in INFORMATION SECURITY APPLICATIONS
  • 2007 A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit in COMPUTATIONAL INTELLIGENCE AND SECURITY
  • 2006 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields in CRYPTOLOGY AND NETWORK SECURITY
  • 2006 Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm) in INFORMATION SECURITY APPLICATIONS
  • 2006 A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach in KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2006 XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing in COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006
  • 2006 Security Enhancement Mechanism for Ad-Hoc OLSR Protocol in INFORMATION NETWORKING. ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS
  • 2006 Efficient Exponentiation in GF(pm) Using the Frobenius Map in COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006
  • 2006 Security Analysis and Implementation Leveraging Globally Networked RFIDs in PERSONAL WIRELESS COMMUNICATIONS
  • 2006 WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment in ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS
  • 2006 Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services in KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2006 An RFID System Based MCLT System with Improved Privacy in EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING
  • 2006 New Security Problem in RFID Systems “Tag Killing” in COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006
  • 2005 XML-Based Security Acceleration Methods Supporting Fast Mobile Grid in E-COMMERCE AND WEB TECHNOLOGIES
  • 2005 Hyperelliptic Curve Coprocessors on a FPGA in INFORMATION SECURITY APPLICATIONS
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1405.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.010610076315.82'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.010610076315.82'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.010610076315.82'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.010610076315.82'


     




    Preview window. Press ESC to close (or click here)


    ...