Digital Library


Search: "[ author: Ho Won Kim ]" (5)
    A Location based Two-Factor L-OTP Protocol
    Hwa Jeong Seo , Ho Won Kim The KIPS Transactions:PartC, Vol. 18, No. 5, pp. 327-330, Oct. 2011
    10.3745/KIPSTC.2011.18.5.327

    A Message Authentication Scheme for V2V message based on RSSI with anonymity
    Hwa Jeong Seo , Ho Won Kim The KIPS Transactions:PartC, Vol. 18, No. 4, pp. 207-212, Aug. 2011
    10.3745/KIPSTC.2011.18.4.207

    Analysis of the Bogus Routing Information Attacks in Sensor Networks
    Myung Jin Lee , Mi Hui Kim , Ki Joon Chae , Ho Won Kim The KIPS Transactions:PartC, Vol. 14, No. 3, pp. 229-238, Jun. 2007
    10.3745/KIPSTC.2007.14.3.229

    Sensor network key establishment mechanism depending on deployment information
    In Shil Doh , Ki Joon Chae , Ho Won Kim The KIPS Transactions:PartC, Vol. 13, No. 2, pp. 195-202, Apr. 2006
    10.3745/KIPSTC.2006.13.2.195

    Zero-knowledge Based User Remote Authentication Over Elliptic Curve
    Jong Seok Choi , Ho Won Kim KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 517-524, Dec. 2013
    10.3745/KTCCS.2013.2.12.517