Digital Library[ Search Result ]
Search : "[ author: Do Won Hong ]" (7)
An Algorithm for Improving the Accuracy of Privacy-Preserving Technique Based on Random Substitutions
Ju Sung Kang Chang Woo Lee Do Won Hong
Vol. 16, No. 5, pp. 563-574, Oct. 2009
10.3745/KIPSTC.2009.16.5.563
Vol. 16, No. 5, pp. 563-574, Oct. 2009

Analysis of Windows Vista Security System for Forensic Examination
Seong Ho Hwang Hyun Woo Nam Neung Soo Park Su Hyung Jo Do Won Hong
Vol. 15, No. 3, pp. 141-148, Jun. 2008
10.3745/KIPSTC.2008.15.3.141
Vol. 15, No. 3, pp. 141-148, Jun. 2008

On the Privacy Preserving Mining Association Rules by using Randomization
Ju Sung Kang Sung Hoon Cho Ok Yeon Yi Do Won Hong
Vol. 14, No. 5, pp. 439-452, Aug. 2007
10.3745/KIPSTC.2007.14.5.439
Vol. 14, No. 5, pp. 439-452, Aug. 2007

Validation Testing Tool for Light-Weight Stream Ciphers
Ju Sung Kang Hyun Koo Shin Ok Yeon Yi Do Won Hong
Vol. 12, No. 4, pp. 495-502, Aug. 2005
10.3745/KIPSTC.2005.12.4.495
Vol. 12, No. 4, pp. 495-502, Aug. 2005

Validation Tool of Elliptic Curves Cryptography Algorithm for the Mobile Internet
Chang Ho Seo Do Won Hong Bo Hyun Yun Seok Woo Kim Ok Yeon Lee
Kyo Il Chung
Vol. 11, No. 5, pp. 569-576, Oct. 2004
10.3745/KIPSTC.2004.11.5.569
Kyo Il Chung
Vol. 11, No. 5, pp. 569-576, Oct. 2004

Provable Security of 3GPP Integrity Algorithm f9
Do Won Hong Sang Uk Shin Heui Su Ryu Kyo Il Chung
Vol. 9, No. 4, pp. 573-580, Aug. 2002
10.3745/KIPSTC.2002.9.4.573
Vol. 9, No. 4, pp. 573-580, Aug. 2002
