BibTeX records: Ohmin Kwon

download as .bib file

@article{DBLP:journals/ieicet/KwonKY19,
  author    = {Ohmin Kwon and
               Hyun Kwon and
               Hyunsoo Yoon},
  title     = {Rootkit inside {GPU} Kernel Execution},
  journal   = {{IEICE} Transactions},
  volume    = {102-D},
  number    = {11},
  pages     = {2261--2264},
  year      = {2019},
  url       = {http://search.ieice.org/bin/summary.php?id=e102-d\_11\_2261},
  timestamp = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ieicet/KwonKY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/KwonKYP19,
  author    = {Hyun Kwon and
               Ohmin Kwon and
               Hyunsoo Yoon and
               Ki{-}Woong Park},
  title     = {Face Friend-Safe Adversarial Example on Face Recognition System},
  booktitle = {Eleventh International Conference on Ubiquitous and Future Networks,
               {ICUFN} 2019, Zagreb, Croatia, July 2-5, 2019},
  pages     = {547--551},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/ICUFN.2019.8806124},
  doi       = {10.1109/ICUFN.2019.8806124},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icufn/KwonKYP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKJJBKY16,
  author    = {Yonggon Kim and
               Ohmin Kwon and
               Jin Soo Jang and
               Seongwook Jin and
               Hyeongboo Baek and
               Brent ByungHoon Kang and
               Hyunsoo Yoon},
  title     = {On-demand bootstrapping mechanism for isolated cryptographic operations
               on commodity accelerators},
  journal   = {Comput. Secur.},
  volume    = {62},
  pages     = {33--48},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.cose.2016.06.006},
  doi       = {10.1016/j.cose.2016.06.006},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/KimKJJBKY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKKY15,
  author    = {Se Hwan Kim and
               Yonggon Kim and
               Ohmin Kwon and
               Hyunsoo Yoon},
  editor    = {Howon Kim and
               Dooho Choi},
  title     = {Fully Batch Processing Enabled Memory Integrity Verification Algorithm
               Based on Merkle Tree},
  booktitle = {Information Security Applications - 16th International Workshop, {WISA}
               2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9503},
  pages     = {386--398},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-31875-2\_32},
  doi       = {10.1007/978-3-319-31875-2\_32},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/KimKKY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcc/KwonKSY14,
  author    = {Ohmin Kwon and
               Dongyoung Koo and
               Yongjoo Shin and
               Hyunsoo Yoon},
  editor    = {James Jong Hyuk Park and
               Albert Y. Zomaya and
               Hwa{-}Young Jeong and
               Mohammad S. Obaidat},
  title     = {An Efficient Audit Scheme for Cloud Storage},
  booktitle = {Frontier and Innovation in Future Computing and Communications, Proceedings
               of the 2014 {FTRA} International Symposium on Frontier and Innovation
               in Future Computing and Communications, {FCC} 2014, Auckland, New
               Zealand, January 13-16, 2014},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {301},
  pages     = {185--192},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-94-017-8798-7\_23},
  doi       = {10.1007/978-94-017-8798-7\_23},
  timestamp = {Wed, 29 May 2019 09:35:20 +0200},
  biburl    = {https://dblp.org/rec/conf/fcc/KwonKSY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcse/HeoKSLKKKY13,
  author    = {Seondong Heo and
               Pyeong Kim and
               Yongjoo Shin and
               Jungmin Lim and
               Dongyoung Koo and
               Yonggon Kim and
               Ohmin Kwon and
               Hyunsoo Yoon},
  title     = {A Survey on Intrusion-Tolerant System},
  journal   = {{JCSE}},
  volume    = {7},
  number    = {4},
  pages     = {242--250},
  year      = {2013},
  url       = {https://doi.org/10.5626/JCSE.2013.7.4.242},
  doi       = {10.5626/JCSE.2013.7.4.242},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcse/HeoKSLKKKY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics