关注
(Heekuck Oh) 오희국
(Heekuck Oh) 오희국
Professor of computer science, hanyang university
在 hanyang.ac.kr 的电子邮件经过验证
标题
引用次数
年份
(t, n)+ 1 threshold secret sharing scheme
KB Kim, SJ Kim, HK Oh
Proceedings of the Korea Information Processing Society Conference, 1052-1055, 2007
2007
2 MALE SEX HORMONES ARE ASSOCIATED WITH METABOLIC SYNDOME IN KOREAN MEN
D Hong, K Kim, H Oh, M Kim
Maturitas, S28, 2012
2012
3-Multi ranked encryption with enhanced security in cloud computing
YE Kim, J Son, RM Parizi, G Srivastava, H Oh
Digital Communications and Networks 9 (2), 313-326, 2023
72023
A designated query protocol for serverless mobile RFID systems with reader and tag privacy
J Lim, S Kim, H Oh, D Kim
Tsinghua Science and Technology 17 (5), 521-536, 2012
162012
A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain
D Ha, H Oh
Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018
2018
A Hiding Original App Method by Altering Android DexClassLoader Execution Flow
H Jo, J Choi, D Ha, J Shin, H Oh
Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017
2017
A hierarchical privacy preserving pseudonymous authentication protocol for VANET
U Rajput, F Abbas, H Oh
Ieee Access 4, 7770-7784, 2016
982016
A hybrid approach for efficient privacy-preserving authentication in VANET
U Rajput, F Abbas, H Eun, H Oh
IEEE Access 5, 12014-12030, 2017
932017
A hybrid-based RFID authentication protocol supporting distributed database
S Kim, J Lim, H Oh
2007 International Conference on Convergence Information Technology (ICCIT …, 2007
12007
A knowledge-based information extraction system for semi-structured labeled documents
J Yang, H Oh, KG Doh, J Choi
Intelligent Data Engineering and Automated Learning—IDEAL 2002: Third …, 2002
92002
A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application
D Ha, H Oh
Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018
2018
A New Approach Towards Aggregation in VANET
R Hussain, F Abbas, J Son, S Kim, H Oh
한국정보처리학회 학술대회논문집 20 (2), 214-217, 2013
2013
A new authentication protocol for IEEE 802.11 using a group key supporting fast handover
C Lee, H Oh, S Kim
2007 International Conference on Convergence Information Technology (ICCIT …, 2007
72007
A New Dynamic ID-based RFID Mutual Authentication Protocol Providing Perfect Synchronization
J Lim, S Kim, H Oh
International Information Institute (Tokyo). Information 15 (2), 639, 2012
2012
A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem
JH Lim, HK Oh, SJ Kim
The KIPS Transactions: PartC 15 (6), 469-480, 2008
2008
A new electronic check system with reusable refunds
S Kim, H Oh
International journal of information security 1, 175-188, 2002
242002
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
J Lim, H Oh, SJ Kim
Information Security Practice and Experience: 4th International Conference …, 2008
412008
A new mobile online social network based location sharing with enhanced privacy protection
J Son, D Kim, R Tashakkori, AO Tokuta, H Oh
2016 25th International Conference on Computer Communication and Networks …, 2016
102016
A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment
J Son, D Kim, MZA Bhuiyan, R Hussain, H Oh
Concurrency and Computation: Practice and Experience 29 (14), e3946, 2017
112017
A new privacy aware payment scheme for wireless charging of electric vehicles
Z Rezaeifar, R Hussain, S Kim, H Oh
Wireless Personal Communications 92, 1011-1028, 2017
112017
系统目前无法执行此操作,请稍后再试。
文章 1–20