default search action
Howon Kim 0001
Person information
- affiliation: Pusan National University, Department of Electronics and Computer Engineering, South Korea
- affiliation (1998 - 2008): Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea
- affiliation (PhD 1999): Pohang University of Science and Technology (POSTECH), South Korea
Other persons with the same name
- Howon Kim 0002 (aka: HoWon Kim 0002, Ho-Won Kim 0002, Ho Won Kim 0002) — Electronics and Telecommunications Research Institute (ETRI), Artificial Intelligence Research Laboratory, Daejeon, South Korea (and 2 more)
- Howon Kim 0003 (aka: Ho-Won Kim 0003) — Inje University, School of Management, South Korea
- Howon Kim 0004 — Sungkyunkwan University, Department of the Electrical and Computer Engineering, Suwon, South Korea
- HoWon Kim 0005 — Pukyong National University, Department of Smart Robot Convergence and Application Engineering, Busan, South Korea
- Ho Won Kim 0004 — SKAIChips, Suwon, South Korea (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim:
High- and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation. IEEE Access 12: 8806-8821 (2024) - [j80]Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Thi-Thu-Huong Le, Janghyun Ji, Howon Kim:
Toward Hybrid Classical Deep Learning-Quantum Methods for Steganalysis. IEEE Access 12: 45238-45252 (2024) - [j79]Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Janghyun Ji, Howon Kim:
A Deep Inside Quantum Technology Industry Trends and Future Implications. IEEE Access 12: 115776-115801 (2024) - [j78]Thi-Thu-Huong Le, Jaehyun Kim, Sangmyeong Lee, Howon Kim:
Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access 12: 154700-154717 (2024) - [j77]Thi-Thu-Huong Le, Yeonjeong Hwang, Hyoeun Kang, Howon Kim:
Robust Credit Card Fraud Detection Based on Efficient Kolmogorov-Arnold Network Models. IEEE Access 12: 157006-157020 (2024) - [j76]Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Jaehan Cho, Howon Kim:
A Highly Efficient ECPM Quantum Circuit for Binary Elliptic Curve Cryptanalysis. IEEE Access 12: 161569-161583 (2024) - [j75]Thi-Thu-Huong Le, Yeongjae Shin, Myeongkil Kim, Howon Kim:
Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification. Appl. Soft Comput. 157: 111517 (2024) - [j74]Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, Agus Mahardika Ari Laksmono, Howon Kim:
Secure decentralized firmware update delivery service for Internet of Things. Internet Things 26: 101136 (2024) - [e4]Howon Kim, Jonghee M. Youn:
Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14402, Springer 2024, ISBN 978-981-99-8023-9 [contents] - [i26]Derry Pratama, Naufal Suryanto, Andro Aprila Adiputra, Thi-Thu-Huong Le, Ahmada Yusril Kadiptya, Muhammad Iqbal, Howon Kim:
CIPHER: Cybersecurity Intelligent Penetration-testing Helper for Ethical Researcher. CoRR abs/2408.11650 (2024) - [i25]Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Yongsu Kim, Howon Kim:
Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack. CoRR abs/2408.14879 (2024) - [i24]Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Thi-Thu-Huong Le, Derry Pratama, Yongsu Kim, Howon Kim:
Cityscape-Adverse: Benchmarking Robustness of Semantic Segmentation with Realistic Scene Modifications via Diffusion-Based Image Editing. CoRR abs/2411.00425 (2024) - [i23]Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, Howon Kim:
ECPM Cryptanalysis Resource Estimation. IACR Cryptol. ePrint Arch. 2024: 1767 (2024) - 2023
- [j73]Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim:
Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era. IEEE Access 11: 21848-21862 (2023) - [j72]Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Janghyun Ji, Howon Kim:
Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves. IEEE Access 11: 45083-45097 (2023) - [j71]Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jonguk Park, Howon Kim:
Depth Optimization of FLT-Based Quantum Inversion Circuit. IEEE Access 11: 54910-54927 (2023) - [j70]Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Uk Jo, Howon Kim:
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data. IEEE Access 11: 131661-131676 (2023) - [j69]Donggyu Kim, Uk Jo, Yohan Kim, Yustus Eko Oktian, Howon Kim:
Design and Implementation of a Blockchain Based Interworking of oneM2M and LWM2M IoT Systems. J. Inf. Process. Syst. 19(1): 89-97 (2023) - [j68]Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim, Donghyun Kwon:
DEMIX: Domain-Enforced Memory Isolation for Embedded System. Sensors 23(7): 3568 (2023) - [j67]Thi-Thu-Huong Le, Yustus Eko Oktian, Uk Jo, Howon Kim:
Time Series Electrical Motor Drives Forecasting Based on Simulation Modeling and Bidirectional Long-Short Term Memory. Sensors 23(17): 7647 (2023) - [c89]Aji Teguh Prihatno, Hyoeun Kang, Chang Woo Choi, Thi-Thu-Huong Le, Shinwook Heo, Myeongkil Kim, Howon Kim:
2D Fluid Flows Prediction Based on U-Net Architecture. ICAIIC 2023: 452-456 - [c88]Chang Woo Choi, Hyoeun Kang, Yoonyoung Hong, Yong Su Kim, Guem Bo Kim, Aji Teguh Prihatno, Jang Hyun Ji, Seung Do Hong, Ho Won Kim:
Indoor Space Flow Analysis Based on Deep Learning. ICAIIC 2023: 771-776 - [c87]Naufal Suryanto, Yongsu Kim, Harashta Tatimma Larasati, Hyoeun Kang, Thi-Thu-Huong Le, Yoonyoung Hong, Hunmin Yang, Se-Yoon Oh, Howon Kim:
ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion. ICCV 2023: 4282-4291 - [c86]Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim:
Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis. ICISC (1) 2023: 140-160 - [c85]Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, Janghyun Ji, Shinwook Heo:
Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data. SoICT 2023: 777-784 - [c84]Aji Teguh Prihatno, Naufal Suryanto, Harashta Tatimma Larasati, Yustus Eko Oktian, Thi-Thu-Huong Le, Howon Kim:
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain. WISA 2023: 79-90 - [c83]Yustus Eko Oktian, Uk Jo, Simon Oh, Hanho Jeong, Jaehyun Kim, Thi-Thu-Huong Le, Howon Kim:
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment. WISA 2023: 131-142 - [c82]Harashta Tatimma Larasati, Howon Kim:
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves. WISA 2023: 297-309 - [i22]Harashta Tatimma Larasati, Howon Kim:
Quantum Circuit Designs of Point Doubling for Binary Elliptic Curves. CoRR abs/2306.07530 (2023) - [i21]Naufal Suryanto, Yongsu Kim, Harashta Tatimma Larasati, Hyoeun Kang, Thi-Thu-Huong Le, Yoonyoung Hong, Hunmin Yang, Se-Yoon Oh, Howon Kim:
ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion. CoRR abs/2308.07009 (2023) - [i20]Derry Pratama, Jaegeun Moon, Agus Mahardika Ari Laksmono, Dongwook Yun, Iqbal Muhammad, Byeonguk Jeong, Janghyun Ji, Howon Kim:
Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol. CoRR abs/2309.05913 (2023) - [i19]Harashta Tatimma Larasati, Howon Kim:
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves. IACR Cryptol. ePrint Arch. 2023: 1140 (2023) - 2022
- [j66]Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim:
A High-Performance ECC Processor Over Curve448 Based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier. IEEE Access 10: 67470-67481 (2022) - [j65]Yustus Eko Oktian, Shinwook Heo, Howon Kim:
SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline. IEEE Access 10: 89714-89731 (2022) - [j64]Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, Howon Kim:
Blockchain-Powered Bandwidth Trading on SDN-Enabled Edge Network. IEEE Access 10: 114024-114039 (2022) - [j63]Thi-Thu-Huong Le, Haeyoung Kim, Hyoeun Kang, Howon Kim:
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method. Sensors 22(3): 1154 (2022) - [j62]Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, Howon Kim:
RealPrice: Blockchain-Powered Real-Time Pricing for Software-Defined Enabled Edge Network. Sensors 22(24): 9639 (2022) - [c81]Harashta Tatimma Larasati, Muhammad Firdaus, Howon Kim:
Quantum Federated Learning: Remarks and Challenges. CSCloud/EdgeCom 2022: 1-5 - [c80]Naufal Suryanto, Yongsu Kim, Hyoeun Kang, Harashta Tatimma Larasati, Youngyeo Yun, Thi-Thu-Huong Le, Hunmin Yang, Se-Yoon Oh, Howon Kim:
DTA: Physical Camouflage Attacks using Differentiable Transformation Network. CVPR 2022: 15284-15293 - [i18]Naufal Suryanto, Yongsu Kim, Hyoeun Kang, Harashta Tatimma Larasati, Youngyeo Yun, Thi-Thu-Huong Le, Hunmin Yang, Se-Yoon Oh, Howon Kim:
DTA: Physical Camouflage Attacks using Differentiable Transformation Network. CoRR abs/2203.09831 (2022) - [i17]Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim:
Reducing the Depth of Quantum FLT-Based Inversion Circuit. CoRR abs/2204.08940 (2022) - [i16]Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim:
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA. IACR Cryptol. ePrint Arch. 2022: 50 (2022) - [i15]Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim:
A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier. IACR Cryptol. ePrint Arch. 2022: 371 (2022) - [i14]Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim:
Reducing the Depth of Quantum FLT-Based Inversion Circuit. IACR Cryptol. ePrint Arch. 2022: 463 (2022) - [i13]Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim:
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves. IACR Cryptol. ePrint Arch. 2022: 501 (2022) - 2021
- [j61]Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim:
Robust Adversarial Attack Against Explainable Deep Classification Models Based on Adversarial Images With Different Patch Sizes and Perturbation Ratios. IEEE Access 9: 133049-133061 (2021) - [j60]Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim:
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA. Sensors 21(4): 1451 (2021) - [j59]Yongsu Kim, Hyoeun Kang, Naufal Suryanto, Harashta Tatimma Larasati, Afifatul Mukaroh, Howon Kim:
Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches. Sensors 21(16): 5323 (2021) - [j58]Jinjae Lee, Derry Pratama, Minjae Kim, Howon Kim, Donghyun Kwon:
CoMeT: Configurable Tagged Memory Extension. Sensors 21(22): 7771 (2021) - [j57]Thi-Thu-Huong Le, Shinwook Heo, Howon Kim:
Toward Load Identification Based on the Hilbert Transform and Sequence to Sequence Long Short-Term Memory. IEEE Trans. Smart Grid 12(4): 3252-3264 (2021) - [c79]Harashta Tatimma Larasati, Howon Kim:
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem. WISA 2021: 91-104 - [c78]Asep Muhamad Awaludin, Derry Pratama, Howon Kim:
AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling. WISA 2021: 157-168 - 2020
- [j56]Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim:
Household Appliance Classification Using Lower Odd-Numbered Harmonics and the Bagging Decision Tree. IEEE Access 8: 55937-55952 (2020) - [j55]Afifatul Mukaroh, Thi-Thu-Huong Le, Howon Kim:
Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load Identification. Sensors 20(19): 5674 (2020) - [j54]Naufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim:
A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization. Sensors 20(24): 7158 (2020) - [j53]Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo:
Efficient Software Implementation of Ring-LWE Encryption on IoT Processors. IEEE Trans. Computers 69(10): 1424-1433 (2020) - [c77]Naufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim:
ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization. CCSW 2020: 165 - [c76]Haeyoung Kim, Jinjae Lee, Derry Pratama, Asep Muhamad Awaludin, Howon Kim, Donghyun Kwon:
RIMI: Instruction-level Memory Isolation for Embedded Systems on RISC-V. ICCAD 2020: 34:1-34:9 - [c75]Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati, Howon Kim:
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches. WISA 2020: 3-15
2010 – 2019
- 2019
- [j52]Zhe Liu, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo, Howon Kim:
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things. IEEE Trans. Dependable Secur. Comput. 16(3): 521-529 (2019) - 2018
- [j51]Jihyun Kim, Thi-Thu-Huong Le, Howon Kim:
Corrigendum to "Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature". Comput. Intell. Neurosci. 2018: 7080564:1 (2018) - [j50]Zhe Liu, Hwajeong Seo, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure GCM implementation on AVR. Discret. Appl. Math. 241: 58-66 (2018) - [j49]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno. Int. J. Netw. Comput. 8(2): 341-350 (2018) - [j48]Taehwan Park, Hwajeong Seo, Sokjoon Lee, Howon Kim:
Secure Data Encryption for Cloud-Based Human Care Services. J. Sensors 2018: 6492592:1-6492592:10 (2018) - [j47]Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, Howon Kim:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. Secur. Commun. Networks 2018: 7012056:1-7012056:10 (2018) - [j46]Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:
Secure IoT framework and 2D architecture for End-To-End security. J. Supercomput. 74(8): 3521-3535 (2018) - [j45]Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:
Erratum to: Secure IoT framework and 2D architecture for End-To-End security. J. Supercomput. 74(8): 3536 (2018) - [j44]Jihyun Kim, Yonghun Jeon, Howon Kim:
The intelligent IoT common service platform architecture and service implementation. J. Supercomput. 74(9): 4242-4260 (2018) - [c74]Thi-Thu-Huong Le, Taehwan Park, Dongkeun Cho, Howon Kim:
An Effective Classification for DoS Attacks in Wireless Sensor Networks. ICUFN 2018: 689-692 - [c73]Taehwan Park, Hwajeong Seo, Chanhui Park, Howon Kim:
Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON. ICUFN 2018: 703-707 - [c72]Chanhui Park, Taehwan Park, Hwajeong Seo, Howon Kim:
Optimization of CHAM Encryption Algorithm Based on Javascript. ICUFN 2018: 774-778 - [c71]Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim:
Parallel Implementations of CHAM. WISA 2018: 93-104 - [e3]Howon Kim, Dong-Chan Kim:
Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10779, Springer 2018, ISBN 978-3-319-78555-4 [contents] - 2017
- [j43]Hwajeong Seo, Jiye Kim, Howon Kim, Zhe Liu:
Personal identification number entry for Google glass. Comput. Electr. Eng. 63: 160-167 (2017) - [j42]Jihyun Kim, Thi-Thu-Huong Le, Howon Kim:
Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature. Comput. Intell. Neurosci. 2017: 4216281:1-4216281:22 (2017) - [j41]Md. Al-Amin Khandaker, Taehwan Park, Yasuyuki Nogami, Howon Kim:
A Comparative Study of Twist Property in KSS Curves of Embedding Degree 16 and 18 from the Implementation Perspective. J. Inform. and Commun. Convergence Engineering 15(2) (2017) - [j40]Hwajeong Seo, Howon Kim:
Hidden Indicator Based PIN-Entry Method Using Audio Signals. J. Inform. and Commun. Convergence Engineering 15(2) (2017) - [j39]Hwajeong Seo, Howon Kim:
MoTE-ECC Based Encryption on MSP430. J. Inform. and Commun. Convergence Engineering 15(3) (2017) - [j38]Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. ACM Trans. Embed. Comput. Syst. 16(4): 117:1-117:24 (2017) - [c70]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller. CANDAR 2017: 445-450 - [c69]Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim:
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. ICISC 2017: 175-188 - [c68]Hwajeong Seo, Garam Lee, Taehwan Park, Howon Kim:
Compact GCM implementations on 32-bit ARMv7-A processors. ICTC 2017: 704-707 - [c67]Garam Lee, Hwajeong Seo, Taehwan Park, Howon Kim:
Optimized implementation of chaskey MAC on 16-bit MSP430. ICUFN 2017: 904-909 - [c66]Taehwan Park, Hwajeong Seo, Garam Lee, Howon Kim:
Efficient implementation of simeck family block cipher on 16-bit MSP430. ICUFN 2017: 983-988 - [c65]Hwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited. WISA 2017: 3-15 - [c64]Hwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim:
ARM/NEON Co-design of Multiplication/Squaring. WISA 2017: 72-84 - [c63]Taehwan Park, Hwajeong Seo, Garam Lee, Md. Al-Amin Khandaker, Yasuyuki Nogami, Howon Kim:
Parallel Implementations of SIMON and SPECK, Revisited. WISA 2017: 283-294 - 2016
- [j37]Zhe Liu, Hwajeong Seo, Howon Kim:
A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges. J. Comput. Sci. Technol. 31(2): 284-299 (2016) - [j36]Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim:
Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor. J. Inform. and Commun. Convergence Engineering 14(3) (2016) - [j35]Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim:
Secure Message Transmission against Remote Control System. J. Inform. and Commun. Convergence Engineering 14(4) (2016) - [j34]Thi-Thu-Huong Le, Jihyun Kim, Howon Kim:
Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection. J. Multim. Inf. Syst. 3(3): 91-96 (2016) - [j33]Jongseok Choi, Seonhee Seok, Hwajeong Seo, Howon Kim:
A fast ARX model-based image encryption scheme. Multim. Tools Appl. 75(22): 14685-14706 (2016) - [j32]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary field multiplication on ARMv8. Secur. Commun. Networks 9(13): 2051-2058 (2016) - [j31]Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation. Secur. Commun. Networks 9(18): 5401-5411 (2016) - [j30]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Hybrid Montgomery Reduction. ACM Trans. Embed. Comput. Syst. 15(3): 58:1-58:13 (2016) - [j29]Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes. IEEE Trans. Inf. Forensics Secur. 11(7): 1385-1397 (2016) - [c62]Thi-Thu-Huong Le, Jihyun Kim, Howon Kim:
Classification performance using gated recurrent unit recurrent neural network on energy disaggregation. ICMLC 2016: 105-110 - [c61]Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo:
Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform. RFIDSec 2016: 76-90 - [c60]Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim:
Slowloris DoS Countermeasure over WebSocket. WISA 2016: 42-53 - [c59]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. WISA 2016: 318-330 - [c58]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward. WISA 2016: 331-340 - [e2]Howon Kim, Dooho Choi:
Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9503, Springer 2016, ISBN 978-3-319-31874-5 [contents] - 2015
- [j28]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Montgomery multiplication and squaring for Optimal Prime Fields. Comput. Secur. 52: 276-291 (2015) - [j27]Hwajeong Seo, Howon Kim:
Consecutive Operand-Caching Method for Multiprecision Multiplication, Revisited. J. Inform. and Commun. Convergence Engineering 13(1): 27-35 (2015) - [j26]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields. Secur. Commun. Networks 8(17): 3121-3130 (2015) - [j25]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Optimized Karatsuba squaring on 8-bit AVR processors. Secur. Commun. Networks 8(18): 3546-3554 (2015) - [c57]Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-Bit AVR Processors. CHES 2015: 663-682 - [c56]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:
Faster ECC over F2521-1 (feat. NEON). ICISC 2015: 169-181 - [c55]Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. WISA 2015: 28-40 - [c54]Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Compact Implementations of LSH. WISA 2015: 41-53 - [c53]Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. WISA 2015: 161-173 - [c52]Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim:
Open Sesame! Hacking the Password. WISA 2015: 215-226 - [c51]Jihyun Kim, Howon Kim:
Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization. WISA 2015: 357-369 - [i12]Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-bit AVR Processors. IACR Cryptol. ePrint Arch. 2015: 410 (2015) - [i11]Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. IACR Cryptol. ePrint Arch. 2015: 465 (2015) - [i10]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary Field Multiplication on ARMv8. IACR Cryptol. ePrint Arch. 2015: 688 (2015) - [i9]Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. IACR Cryptol. ePrint Arch. 2015: 732 (2015) - [i8]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Faster ECC over F2571 (feat. PMULL). IACR Cryptol. ePrint Arch. 2015: 745 (2015) - [i7]Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 799 (2015) - [i6]Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim:
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture. IACR Cryptol. ePrint Arch. 2015: 1081 (2015) - 2014
- [j24]Aparna Vegendla, Hwajeong Seo, Donggeon Lee, Howon Kim:
Implementation of an RFID Key Management System for DASH7. J. Inform. and Commun. Convergence Engineering 12(1): 19-25 (2014) - [j23]Hwajeong Seo, Howon Kim:
Study of Modular Multiplication Methods for Embedded Processors. J. Inform. and Commun. Convergence Engineering 12(3): 145-153 (2014) - [j22]Hwajeong Seo, Howon Kim:
Low-Power Encryption Algorithm Block Cipher in JavaScript. J. Inform. and Commun. Convergence Engineering 12(4): 252-256 (2014) - [j21]Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, Howon Kim:
Binary and prime field multiplication for public key cryptography on embedded microprocessors. Secur. Commun. Networks 7(4): 774-787 (2014) - [j20]Donggeon Lee, Dong-Chan Kim, Daesung Kwon, Howon Kim:
Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA. Sensors 14(1): 975-994 (2014) - [j19]Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim:
Small Private Key MQPKS on an Embedded Microprocessor. Sensors 14(3): 5441-5458 (2014) - [c50]Ha Van Nguyen, Hwajeong Seo, Howon Kim:
Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA. FDSE 2014: 191-203 - [c49]Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors. ICICS 2014: 158-175 - [c48]Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim:
Montgomery Modular Multiplication on ARM-NEON Revisited. ICISC 2014: 328-342 - [c47]Hwajeong Seo, Howon Kim:
Multi-precision squaring on MSP and ARM processors. ICTC 2014: 356-361 - [c46]Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim:
Pseudo random number generator and Hash function for embedded microprocessors. WF-IoT 2014: 37-40 - [c45]Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim:
Short paper: Surveillance system with light sensor. WF-IoT 2014: 165-166 - [c44]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Improved Modular Multiplication for Optimal Prime Fields. WISA 2014: 150-161 - [c43]Yeoncheol Lee, Hwajeong Seo, Howon Kim:
The Unified Hardware Design for GCM and SGCM. WISA 2014: 307-320 - [i5]Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim:
Montgomery Modular Multiplication on ARM-NEON Revisited. IACR Cryptol. ePrint Arch. 2014: 760 (2014) - [i4]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Optimized Karatsuba Squaring on 8-bit AVR Processors. IACR Cryptol. ePrint Arch. 2014: 817 (2014) - 2013
- [j18]Hwajeong Seo, Howon Kim:
Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions. J. Inform. and Commun. Convergence Engineering 11(1): 12-16 (2013) - [j17]Hwajeong Seo, Kyung-Ah Shim, Howon Kim:
Performance enhancement of TinyECC based on multiplication optimizations. Secur. Commun. Networks 6(2): 151-160 (2013) - [j16]Donggeon Lee, Dooho Choi, Jungtaek Seo, Howon Kim:
Reset Tree-Based Optical Fault Detection. Sensors 13(5): 6713-6729 (2013) - [j15]Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim:
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Sensors 13(7): 9483-9512 (2013) - [c42]Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. ICICS 2013: 302-317 - [c41]Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim:
Parallel Implementations of LEA. ICISC 2013: 256-274 - [c40]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. INDOCRYPT 2013: 227-243 - 2012
- [j14]You-Seok Lee, Young-Jun Lee, Dong-Guk Han, Howon Kim, Hyoung-Nam Kim:
Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(6): 1091-1094 (2012) - [j13]Hwajeong Seo, Howon Kim:
Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations. J. Inform. and Commun. Convergence Engineering 10(1): 53-60 (2012) - [j12]Hwajeong Seo, Howon Kim:
Network and Data Link Layer Security for DASH7. J. Inform. and Commun. Convergence Engineering 10(3): 248-252 (2012) - [j11]Hwajeong Seo, Howon Kim:
Always Metastable State True Random Number Generator. J. Inform. and Commun. Convergence Engineering 10(3): 253-257 (2012) - [j10]Hwajeong Seo, Howon Kim:
ZigBee Security Using Attribute-Based Proxy Re-encryption. J. Inform. and Commun. Convergence Engineering 10(4): 343-348 (2012) - [j9]Hwajeong Seo, Howon Kim:
Four Anchor Sensor Nodes Based Localization Algorithm over Three-Dimensional Space. J. Inform. and Commun. Convergence Engineering 10(4): 349-358 (2012) - [c39]Yanghyeon Kwon, Howon Kim:
Efficient group key management of ZigBee network for home automation. ICCE 2012: 378-379 - [c38]Jongseok Choi, Howon Kim:
Dynamic Tag Identity-Based Encryption Scheme for Logistic Systems. LDIC 2012: 267-276 - [c37]Hwajeong Seo, Howon Kim:
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. WISA 2012: 55-67 - [e1]Howon Kim:
Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7259, Springer 2012, ISBN 978-3-642-31911-2 [contents] - 2011
- [j8]Hwajeong Seo, Howon Kim:
Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks. J. Inform. and Commun. Convergence Engineering 9(6): 676-682 (2011) - [j7]Hwajeong Seo, Howon Kim:
Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network. J. Inform. and Commun. Convergence Engineering 9(6): 683-688 (2011) - 2010
- [c36]Donggeon Lee, Seongyun Kim, Howon Kim, Namje Park:
Mobile Platform for Networked RFID Applications. ITNG 2010: 625-630
2000 – 2009
- 2009
- [j6]Dong-Guk Han, Dooho Choi, Howon Kim:
Improved Computation of Square Roots in Specific Finite Fields. IEEE Trans. Computers 58(2): 188-196 (2009) - 2008
- [j5]Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Howon Kim, Tsuyoshi Takagi:
A More Compact Representation of XTR Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 2843-2850 (2008) - [j4]Dooho Choi, Dong-Guk Han, Howon Kim:
Construction of efficient and secure pairing algorithm and its application. J. Commun. Networks 10(4): 437-443 (2008) - [c35]Namje Park, Youjin Song, Dongho Won, Howon Kim:
Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. APWeb 2008: 331-341 - [c34]You-Seok Lee, YongJe Choi, Dong-Guk Han, Ho Won Kim, Hyoung-Nam Kim:
A nobel key-search method for side channel attacks based on pattern recognition. ICASSP 2008: 1773-1776 - 2007
- [c33]Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi:
Compressed XTR. ACNS 2007: 420-431 - [c32]Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim:
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295 - [c31]Byungil Lee, Howon Kim:
A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor. IHN 2007: 215-224 - [c30]Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim:
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253 - [c29]Byungil Lee, Howon Kim:
Privacy Management for Medical Service Application Using Mobile Phone Collaborated with RFID Reader. SITIS 2007: 1053-1057 - [c28]HeeSeok Kim, Tae Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim:
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52 - [i3]Dooho Choi, Dong-Guk Han, Howon Kim:
Construction of Efficient and Secure Pairing Algorithm and its Application. IACR Cryptol. ePrint Arch. 2007: 296 (2007) - 2006
- [c27]Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim:
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748 - [c26]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 - [c25]JeaHoon Park, Hoon-Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon:
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. CIS 2006: 417-426 - [c24]Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won:
An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 - [c23]Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won:
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. ICCSA (5) 2006: 251-259 - [c22]Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung:
New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384 - [c21]Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung:
Efficient Exponentiation in GF(pm) Using the Frobenius Map. ICCSA (4) 2006: 584-593 - [c20]Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung:
Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326 - [c19]Namje Park, Seungjoo Kim, Dongho Won, Howon Kim:
Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505 - [c18]Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim:
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934 - [c17]Jooyoung Lee, HoWon Kim:
A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach. KES (1) 2006: 1250-1258 - [c16]Namje Park, Jooyoung Lee, Howon Kim, Kyoil Chung, Sungwon Sohn:
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). NOMS 2006 - [c15]Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim:
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. WISA 2006: 173-186 - [i2]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. IACR Cryptol. ePrint Arch. 2006: 243 (2006) - 2005
- [c14]Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, Dongho Won:
XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373 - [c13]Byungil Lee, Howon Kim:
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. CIS (2) 2005: 469-475 - [c12]Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung:
Design and Implementation of Crypto Co-processor and Its Application to Security Systems. CIS (2) 2005: 1104-1109 - [c11]Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, Dongho Won:
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326 - [c10]Byungil Lee, Howon Kim:
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. EUC Workshops 2005: 673-682 - [c9]Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Howon Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873 - [c8]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee:
A Survivability Model for Cluster System Under DoS Attacks. HPCC 2005: 567-572 - [c7]Namje Park, Howon Kim, Seungjoo Kim, Dongho Won:
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155 - [c6]Namje Park, Kiyoung Moon, Howon Kim, Kyoil Chung, Sungwon Sohn:
An efficient software-based security acceleration methods for open LBS services. IGARSS 2005: 4 - [c5]Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn:
A secure and privacy enhanced LBS security elements based on KLP. IGARSS 2005: 1221-1224 - [c4]Namje Park, Howon Kim, Kyoil Chung, Sungwon Sohn:
An enhanced LBS security protocol in wireless networks. IGARSS 2005: 1594-1597 - [c3]Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim:
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). WISA 2005: 207-217 - [i1]Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. IACR Cryptol. ePrint Arch. 2005: 316 (2005) - 2004
- [j3]Ku-Young Chang, Howon Kim, Ju-Sung Kang, Hyun Sook Cho:
An extension of TYT algorithm for GF((2n)m) using precomputation. Inf. Process. Lett. 92(5): 231-234 (2004) - [j2]Ho Won Kim, Sunggu Lee:
Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Trans. Consumer Electron. 50(1): 214-224 (2004) - [c2]Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil Chung, Christof Paar:
Hyperelliptic Curve Coprocessors on a FPGA. WISA 2004: 360-374
1990 – 1999
- 1998
- [j1]Howon Kim, Hyun Suk Lee, Sunggu Lee, Jong Kim:
Adaptive Virtual Cut-Through as a Viable Routing Method. J. Parallel Distributed Comput. 52(1): 82-95 (1998) - 1995
- [c1]Hyun Suk Lee, Howon Kim, Jong Kim, Sunggu Lee:
Adaptive Virutal Cut-through as an Alternative to Wormhole Routing. ICPP (1) 1995: 68-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint