(t, n)+ 1 threshold secret sharing scheme KB Kim, SJ Kim, HK Oh Proceedings of the Korea Information Processing Society Conference, 1052-1055, 2007 | | 2007 |
2 MALE SEX HORMONES ARE ASSOCIATED WITH METABOLIC SYNDOME IN KOREAN MEN D Hong, K Kim, H Oh, M Kim Maturitas, S28, 2012 | | 2012 |
3-Multi ranked encryption with enhanced security in cloud computing YE Kim, J Son, RM Parizi, G Srivastava, H Oh Digital Communications and Networks 9 (2), 313-326, 2023 | 7 | 2023 |
A designated query protocol for serverless mobile RFID systems with reader and tag privacy J Lim, S Kim, H Oh, D Kim Tsinghua Science and Technology 17 (5), 521-536, 2012 | 16 | 2012 |
A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain D Ha, H Oh Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018 | | 2018 |
A Hiding Original App Method by Altering Android DexClassLoader Execution Flow H Jo, J Choi, D Ha, J Shin, H Oh Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017 | | 2017 |
A hierarchical privacy preserving pseudonymous authentication protocol for VANET U Rajput, F Abbas, H Oh Ieee Access 4, 7770-7784, 2016 | 98 | 2016 |
A hybrid approach for efficient privacy-preserving authentication in VANET U Rajput, F Abbas, H Eun, H Oh IEEE Access 5, 12014-12030, 2017 | 93 | 2017 |
A hybrid-based RFID authentication protocol supporting distributed database S Kim, J Lim, H Oh 2007 International Conference on Convergence Information Technology (ICCIT …, 2007 | 1 | 2007 |
A knowledge-based information extraction system for semi-structured labeled documents J Yang, H Oh, KG Doh, J Choi Intelligent Data Engineering and Automated Learning—IDEAL 2002: Third …, 2002 | 9 | 2002 |
A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application D Ha, H Oh Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018 | | 2018 |
A New Approach Towards Aggregation in VANET R Hussain, F Abbas, J Son, S Kim, H Oh 한국정보처리학회 학술대회논문집 20 (2), 214-217, 2013 | | 2013 |
A new authentication protocol for IEEE 802.11 using a group key supporting fast handover C Lee, H Oh, S Kim 2007 International Conference on Convergence Information Technology (ICCIT …, 2007 | 7 | 2007 |
A New Dynamic ID-based RFID Mutual Authentication Protocol Providing Perfect Synchronization J Lim, S Kim, H Oh International Information Institute (Tokyo). Information 15 (2), 639, 2012 | | 2012 |
A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem JH Lim, HK Oh, SJ Kim The KIPS Transactions: PartC 15 (6), 469-480, 2008 | | 2008 |
A new electronic check system with reusable refunds S Kim, H Oh International journal of information security 1, 175-188, 2002 | 24 | 2002 |
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection J Lim, H Oh, SJ Kim Information Security Practice and Experience: 4th International Conference …, 2008 | 41 | 2008 |
A new mobile online social network based location sharing with enhanced privacy protection J Son, D Kim, R Tashakkori, AO Tokuta, H Oh 2016 25th International Conference on Computer Communication and Networks …, 2016 | 10 | 2016 |
A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment J Son, D Kim, MZA Bhuiyan, R Hussain, H Oh Concurrency and Computation: Practice and Experience 29 (14), e3946, 2017 | 11 | 2017 |
A new privacy aware payment scheme for wireless charging of electric vehicles Z Rezaeifar, R Hussain, S Kim, H Oh Wireless Personal Communications 92, 1011-1028, 2017 | 11 | 2017 |