Digital Library[ Search Result ]
Search : "[ author: Do Won Hong ]" (7)
An Algorithm for Improving the Accuracy of Privacy-Preserving Technique Based on Random Substitutions
Ju Sung Kang Chang Woo Lee Do Won Hong
Vol. 16, No. 5, pp. 563-574, Oct. 2009
10.3745/KIPSTC.2009.16.5.563
Vol. 16, No. 5, pp. 563-574, Oct. 2009
10.3745/KIPSTC.2009.16.5.563
Analysis of Windows Vista Security System for Forensic Examination
Seong Ho Hwang Hyun Woo Nam Neung Soo Park Su Hyung Jo Do Won Hong
Vol. 15, No. 3, pp. 141-148, Jun. 2008
10.3745/KIPSTC.2008.15.3.141
Vol. 15, No. 3, pp. 141-148, Jun. 2008
10.3745/KIPSTC.2008.15.3.141
On the Privacy Preserving Mining Association Rules by using Randomization
Ju Sung Kang Sung Hoon Cho Ok Yeon Yi Do Won Hong
Vol. 14, No. 5, pp. 439-452, Aug. 2007
10.3745/KIPSTC.2007.14.5.439
Vol. 14, No. 5, pp. 439-452, Aug. 2007
10.3745/KIPSTC.2007.14.5.439
Validation Testing Tool for Light-Weight Stream Ciphers
Ju Sung Kang Hyun Koo Shin Ok Yeon Yi Do Won Hong
Vol. 12, No. 4, pp. 495-502, Aug. 2005
10.3745/KIPSTC.2005.12.4.495
Vol. 12, No. 4, pp. 495-502, Aug. 2005
10.3745/KIPSTC.2005.12.4.495
Validation Tool of Elliptic Curves Cryptography Algorithm for the Mobile Internet
Chang Ho Seo Do Won Hong Bo Hyun Yun Seok Woo Kim Ok Yeon Lee
Kyo Il Chung
Vol. 11, No. 5, pp. 569-576, Oct. 2004
10.3745/KIPSTC.2004.11.5.569
Kyo Il Chung
Vol. 11, No. 5, pp. 569-576, Oct. 2004
10.3745/KIPSTC.2004.11.5.569
Provable Security of 3GPP Integrity Algorithm f9
Do Won Hong Sang Uk Shin Heui Su Ryu Kyo Il Chung
Vol. 9, No. 4, pp. 573-580, Aug. 2002
10.3745/KIPSTC.2002.9.4.573
Vol. 9, No. 4, pp. 573-580, Aug. 2002
10.3745/KIPSTC.2002.9.4.573