• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20002021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations

    Kim, H., Jeon, Y., Kim, G., Kim, J., Sim, B. Y., Han, D. G., Seo, H., Kim, S., Hong, S., Sung, J. & Hong, D., 2021, 23rd International Conference, 2020, Proceedings. Hong, D. (ed.). Springer Science and Business Media Deutschland GmbH, p. 99-122 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2020

    Single Trace Attack on Key Reconciliation Process for Quantum Key Distribution

    Park, D., Heo, D., Kim, S. & Hong, S., 2020 Oct 21, ICTC 2020 - 11th International Conference on ICT Convergence: Data, Network, and AI in the Age of Untact. IEEE Computer Society, p. 209-213 5 p. 9289209. (International Conference on ICT Convergence; vol. 2020-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2019

    Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves

    Kim, S., Yoon, K., Park, Y. H. & Hong, S., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 273-292 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2018

    Single Trace Side Channel Analysis on Quantum Key Distribution

    Kim, S., Jin, S., Lee, Y., Park, B., Kim, H. & Hong, S., 2018 Nov 16, 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. Institute of Electrical and Electronics Engineers Inc., p. 736-739 4 p. 8539703. (9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2017

    STBC: Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay

    Kim, H., Hong, S., Preneel, B. & Verbauwhede, I., 2017 Jul 20, Proceedings - 2017 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2017. Reis, R., Stan, M., Huebner, M. & Voros, N. (eds.). IEEE Computer Society, p. 74-79 6 p. 7987498. (Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI; vol. 2017-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2016

    Binary decision diagram to design balanced secure logic styles

    Kim, H., Hong, S., Preneel, B. & Verbauwhede, I., 2016 Oct 20, 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 7604710. (2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • New efficient padding methods secure against padding oracle attacks

    Kang, H. C., Park, M., Moon, D., Lee, C., Kim, J., Kim, K., Kim, J. & Hong, S., 2016, Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers. Yun, A. & Kwon, S. (eds.). Springer Verlag, p. 329-342 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2015

    AES Sbox GF(2<sup>4</sup>) inversion functions based PUFs

    Kim, H. & Hong, S., 2015 Apr 16, ISOCC 2014 - International SoC Design Conference. Institute of Electrical and Electronics Engineers Inc., p. 15-16 2 p. 7087562

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2014

    Distinguishing attack on SDDO-based block cipher BMD-128

    Kang, J., Jeong, K., Lee, C. & Hong, S., 2014, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 280 LNEE. p. 595-602 8 p. (Lecture Notes in Electrical Engineering; vol. 280 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2012

    BAT: Bimodal cryptographic algorithm suitable for various environments

    Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Differential fault analysis on HAS-160 compression function

    Kang, J., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Differential fault analysis on the block cipher HIGHT

    Lee, Y., Kim, J., Park, J. H. & Hong, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 407-416 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Extended NIST prime family for efficient modular reduction

    Cho, Y. I., Chang, N. S., Kim, C. H. & Hong, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 105-111 7 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved differential fault analysis on block cipher SEED-128

    Lee, Y., Kim, J., Hong, S. & Lee, C., 2012, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 675-680 6 p. 6354905. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the keyschedule of ARIA-128

    Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    A fast and provably secure higher-order masking of AES S-box

    Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)
  • An efficient implementation of KCDSA on Graphic Processing Units

    Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Fault injection attack on A5/3

    Jeong, K., Lee, Y., Sung, J. & Hong, S., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. p. 300-303 4 p. 5951922. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2009

    A new double-block-length hash function using feistel structure

    Lee, J., Hong, S., Sung, J. & Park, H., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2008

    Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

    Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Related-key chosen IV attacks on grain-v1 and grain-128

    Lee, Y., Jeong, K., Sung, J. & Hong, S., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. Springer Verlag, p. 321-335 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Citations (Scopus)
  • Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL

    Lee, E., Chang, D., Kim, J., Sung, J. & Hong, S., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 189-206 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

    Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Smart card-based three-party key exchange without server's assistance

    Kim, Y. H., Youn, T. G., Park, Y. H. & Hong, S. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 146-149 4 p. 4511552. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    Preimage attack on the parallel FFT-hashing function

    Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

    Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Related-key rectangle attacks on reduced AES-192 and AES-256

    Kim, J., Hong, S. & Preneel, B., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Springer Verlag, p. 225-241 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    57 Citations (Scopus)
  • 2006

    A new dedicated 256-bit hash function: FORK-256

    Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D. & Chee, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 195-209 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Citations (Scopus)
  • A weak key class of XTEA for a related-key rectangle attack

    Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Finding collision on 45-Step HAS-160

    Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • HIGHT: A new block cipher suitable for low-resource device

    Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J. & Chee, S., 2006, Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings. Springer Verlag, p. 46-59 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4249 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    436 Citations (Scopus)
  • Improved fast correlation attack on the shrinking and self-shrinking generators

    Jeong, K., Sung, J., Hong, S., Lee, S., Kim, J. & Hong, D., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 260-270 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1

    Kim, J., Biryukov, A., Preneel, B. & Hong, S., 2006, Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings. Springer Verlag, p. 242-256 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4116 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Citations (Scopus)
  • Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 446-455 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2005

    How to construct universal one-way hash functions of order r

    Hong, D., Sung, J., Hong, S. & Lee, S., 2005, Progress in Cryptology - INDOCRYPT 2005 - 6th International Conference on Cryptology in India, Proceedings. Springer Verlag, p. 63-76 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3797 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Related-cipher attacks on block ciphers with flexible number of rounds

    Sung, J., Kim, J., Lee, C. & Hong, S., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology. p. 64-75 12 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Related-key differential attacks on Cobra-H64 and Cobra-H128

    Lee, C., Kim, J., Sung, J., Hong, S., Lee, S. & Moon, D., 2005, Cryptography and Coding - 10th IMA International Conference, Proceedings. Springer Verlag, p. 201-219 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b

    Lee, C., Kim, J., Hong, S., Sung, J. & Lee, S., 2005, Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Proceedings. Springer Verlag, p. 244-262 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3715 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • 2002

    Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • 2001

    Difference distribution attack on DONUT and improved DONUT

    Cheon, D. H., Hong, S., Lee, S., Lee, S. J., Park, K. H. & Yoon, S. H., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2015. p. 37-48 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    49 Citations (Scopus)
  • 2000

    A proposal of a new public key cryptosystem using matrices over a ring

    Yoo, H., Hong, S., Lee, S., Lim, J. I., Yi, O. & Sung, M., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841. p. 41-48 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Citations (Scopus)