scispace - formally typeset
H

Howon Kim

Researcher at Pusan National University

Publications -  297
Citations -  3405

Howon Kim is an academic researcher from Pusan National University. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 25, co-authored 270 publications receiving 2788 citations. Previous affiliations of Howon Kim include Electronics and Telecommunications Research Institute & Katholieke Universiteit Leuven.

Papers
More filters
Journal ArticleDOI

Development of the Power Consumption Simulator and Classification of the Types of Household by Using Data Mining Over Smart Grid

TL;DR: In this article, the authors proposed a methodology to classify the types of families by analysing an power consumption pattern using data mining technique and developed the simulator that generates power consumption patterns of the household and classify the type of family.
Journal ArticleDOI

Analysis for Memory Reduction of the UOV Scheme with the Application of PRNG

TL;DR: This paper measures how much the private key memory size can be reduced by using a secure pseudo-random number generator in the UOV scheme and it is found that almost 93% of the privatekey memory size is reduced.
Journal ArticleDOI

Always Metastable State True Random Number Generator

TL;DR: An efficient filtering system for a metastable state-based true random number generator that uses loop-storage for storing the value of metastability and can maintain high entropy together with the original throughput.
Book ChapterDOI

An RFID system based MCLT system with improved privacy

TL;DR: The proposed MCLT (Missing Child Location Tracking) system can protect users’ privacy while providing location tracking of the RFID tag and keep in line with traditional procedures, commonly accepted by most industrial applications.
Proceedings ArticleDOI

Short paper: Surveillance system with light sensor

TL;DR: A novel surveillance system using light sensor which is commonly available in embedded processors or modern smart-phones is presented, which is easy to install and process and can determine the secure or insecure places with derived information.