Browse "CS-Conference Papers(학술회의논문)" by Author 1505

Showing results 1 to 60 of 247

1
2000년대의 정보보호 기술 및 연구 방향

김광조, WISC`93 패널 토론 자료집, pp.47 - 61, 1993-10

2
2세대 EPCglobal RFID 규격의 보안 취약성 검토 및 개선 방안 연구

박재민; Duc, D.N.; Liem, V.D.; 서영준; 김광조, 2005년도 충청지부 학술대회, pp.207 - 220, 한국정보보호학회, 2005-08-07

3
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments

Konidala, D.M; Duc, D.N; Lee, DongMan; Kim, Kwangjo, Pervasive Computing and Communications Workshops, 2005, pp.136 - 140, 2005-03

4
A capability-based privacy-preserving scheme for pervasive computing environments

Konidala, D.M.; Duc, D.N.; Lee, D.; Kim, Kwangjo, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, pp.136 - 140, IEEE, 2005-03-08

5
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments

Konidala, D.M.; Duc, D.N.; Lee, DongMan; Kim, K, 2004년도 한국정보보호학회 하계정보보호학술대회, pp.0 - 0, 한국정보보호학회, 2004-06

6
A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN

Ahn, Soohyun; Kim, Hakju; Jeong, Jeseong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-22

7
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

Duc, DN; Cheon, JH; Kim, Kwangjo, ICICS03, v.2971, no.0, pp.11 - 21, Springer-Verlag, 2003-10

8
A Framework of Consolidated Authorization Management in e-SCM

Hong, Seung-Phil; Kim, Myungchul; Kim, Kwangjo; Kim, Jinho, Conference on Applied Cryptography and Network Security, pp.0 - 0, 2003-10

9
A Lightweight Authentication Protocol based on Universal Re-encryption of RFID Tags

서영준; 이현록; 김광조, 한국정보보호학회 동계정보보호학술대회, pp.207 - 212, Korea Institute of Information Security & Cryptology, 2006-12-09

10
A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment

Kim, Jangseong; Kim, Zeen; Kim, Kwangjo, 10th International Conference on Information Security and Cryptology (ICISC 2007), v.4817, pp.37 - 48, Springer Verlag (Germany), 2007-11-29

11
A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags

Seo, Y; Asano, T; Lee, H; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01

12
A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment

Kim, Jangseong; Kim, Kwangjo, WISA 2008, v.5379, WISA, 2008-09-23

13
A Micro-payment System for Multiple-Shopping

Lee, M; Kim, Kwangjo, SCIS2002, pp.229 - 234, Institute of Electronics, Information and Communication Engineers, 2002

14
A New Approach of X.509v3 Certificate for Full Path Validation

Park, J; Kim, Kwangjo, SCIS2002, pp.1155 - 1160, SCIS, 2002-01-29

15
A new ID-based Group Signature scheme from bilinear pairings

Chen, X; Zhang, F; Kim, Kwangjo, WISA2003, pp.585 - 592, 2003-08

16
A New Identification Scheme based on the Gap Diffie-Hellman Problem

Kim, M; Kim, Kwangjo, SCIS2002, pp.349 - 352, SCIS, 2002-01

17
A New Provably Secure Transitive Signature Scheme

Kim, Kwangjo; Duc, D.N.; Kim, Z, SCIS, pp.0 - 0, SCIS, 2005-01

18
A new receipt-free voting scheme based on linkable ring signature for designated verifiers

Chen, G.; Wu, C.; Han, W.; Chen, X.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.18 - 23, IEEE, 2008-07-29

19
A New Threshold Blind Signature Scheme from Pairings

Vo, DL; Zhang, F; Kim, Kwangjo, SCIS2003, pp.233 - 238, SCIS, 2003-01

20
A New Transitive Signature Scheme based on RSA-based Security Assumptions

Duc, D.N.; Han, K; Kim, Z; Kim, Kwangjo, ACNS2005, pp.165 - 175, ACNS, 2005-06-07

21
A privacy-preserving kid's safety care service based on sensor network in u-City

Kim, Jangseong; Yoo, Myunghan; Kim, Kwang-Jo, SCIS2010, SCIS, 2010-01-20

22
A Proposed Software Protection Scheme

Wang , P; Kim, Kwangjo, 2004년도 한국정보보호학회 충청지부학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-10

23
A Protocol of Unlinkable Transaction for Preserving Customer Privacy

Kang, S; Asano, T; Kim, Kwangjo, SCIS, Institute of Electronics, Information and Communication Engineers, 2005-01

24
A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment

Kim, Kwangjo; Divyan, K.M.; Deng, R.H.; Zhou, J, SCIS04, pp.931 - 936, SCIS, 2004-01

25
A secure and privacy enhanced protocol for location-based services in ubiquitous society

Konidala, D.M.; Yeun, C.Y.; Kim, Kwangjo, GLOBECOM'04 - IEEE Global Telecommunications Conference, v.4, pp.2164 - 2168, 2004-11-29

26
A Secure Clustering Scheme over an Energy aware Routing Protocol for Monitoring Critical Conditions

Yoo, M; Kim, J; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01

27
A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment

Divyan, K.M.; Kim, Kwangjo, 2003년도 한국정보보호학회 동계학술대회, pp.669 - 685, 한국정보보호학회, 2003-12-06

28
A Secure On-line Lottery using Bank as a notary

Ham, W; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.121 - 124, 한국정보보호학회, 2002-11-16

29
A Secure RFID Reader Protocol based on SLRRP

Lee, H; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23

30
A Secure Testament Revealing Protocol

Han, K; Zhang, F; Kim, J; Kim, Kwangjo, SCIS2003, pp.399 - 404, SCIS, 2003-01

31
A Securely Transferable Ebooks using Public-Key Infrastructure

김명선; 김종승; 이정연; 김광조, 2001년도 한국정보보호학회 종합학술 발표대회, pp.371 - 374, 한국정보보호학회, 2001-11-24

32
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme

Konidala, DM.; Kim, Z; Kim, Kwangjo, International Conference on RFID Security 2007 (RFIDSec 07),, pp.141 - 152, RFIDSec, 2007-07-11

33
A Simple Secure Communication Protocol for RFID Devices

Duc, DN; Park, J; Lee, H; Kwangjo Kim, 2005년 한국정보보호학회 동계정보보호학술대회, pp.254 - 259, Korea Institute of Information Security & Cryptology, 2005-12-03

34
A study on Secret Sharing Scheme Using Visual Cryoptography

Kim, MR; Park, JH; Park, SW; Kim, Kwangjo, SCIS97, 1997-01-29

35
Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

Choi, S; Abe, M; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.495 - 498, 한국정보보호학회, 2002-11-16

36
AES에 대한 DPA 대응방안 개선

장화선; 김광조, 2003년도 한국정보보호학회 충청지부학술대회, pp.3 - 10, 한국정보보호학회, 2003-08-22

37
AES에 대한 오류기반 공격

장화선; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.138 - 141, 한국정보보호학회, 2003-07-04

38
Aggregate proxy signature and verifiably encrypted proxy signature

Li, J.; Kim, Kwangjo; Zhang, F.; Chen, X., 1st International Conference on Provable Security 2007, ProvSec 2007, pp.208 - 217, Springer Verlag (Germany), 2007-11-01

39
An Adaptive Authentication Protocol based on Reputation for Peer-to-Peer System

Lee, H; Kim, Kwangjo, SCIS2003, pp.661 - 666, SCIS, 2003-01

40
An Attack on Tanaka`s Non Interactive Key Sharing Scheme

Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17

41
An Efficient and Privacy Preserving Authentication Protocol for HAN

Chung, Doyoung; Dwijaksara, Made Harta; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27

42
An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks

Yim, J; Choi, I; Kim, Kwangjo, The 10th International Workshop on Information Security Applications (WISA 2009), 2009-08-24

43
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis

Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24

44
An enhanced lightweight authentication protocol for access control in wireless LANs

Ren, K.; Lee, H.; Han, K.; Park, J.; Kim, Kwangjo, 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity, v.2, pp.444 - 450, IEEE, 2004-11-16

45
Analysis of NTRUSign signature scheme

Min, SJ; Kim, Kwangjo; Yamamoto, G, 2003년도 한국정보보호학회 동계학술대회, pp.399 - 405, 한국정보보호학회, 2003-12-06

46
Analysis on Popescu's Group Signature Scheme for Large Groups

Choi, H; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.43 - 46, 한국정보보호학회, 2003-07-04

47
Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices

Kim, J; Choi, S; Kim, Kwangjo; Boyd, C, SCIS2003, pp.405 - 410, SCIS, 2003-01

48
Applying PKI for Internet Voting System

김진호; 김광조; 이병천, 2001년도 한국정보보호학회 종합학술 발표대회, pp.318 - 321, Korea Institute of Information Security & Cryptology, 2001-11-24

49
Arduino를 이용한 CAN의 소규모 실험 환경 구축 및 보안 취약성 검증

안수현; 김광조, CISC-S'15, v.0, 한국정보보호학회, 2015-06-25

50
Asian Academic Activities in Information Security and Cryptography

Kim, Kwang-Jo, IEEE ICITIS2010, IEEE, 2010-12-18

51
Authenticated and DoS-resilient channel assignment mechanism for wireless mesh networks

Shin, Sungmok; Yim, Junhyun; Kim, Kwang-Jo, SCIS2010, SCIS, 2010-01-20

52
Authentication and Payment Protocol Preserving Location Privacy in Mobile IP

Choi, S.; Kim, Kwangjo, IEEE Global Telecommunications Conference GLOBECOM'03, v.3, pp.1410 - 1414, IEEE, 2003-12-01

53
Auto-ID Lab을 통한 RFID 보안기술 연구동향

이현록; 김광조, 한국정보보호학회 영남지부 학술대회, pp.151 - 157, 한국정보보호학회, 2006-02-23

54
BRM sequence generators based on the field GF(2n) for DSP implementations

Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17

55
BRM 수열의 상관 공격 방식

김용대; 이상진; 박상준; 고승철; 김광조, KIISC 종합학술발표회, v.3, no.1, pp.41 - 47, KIISC, 1993-11-20

56
Certificateless authenticated Group Key Agreement protocol for dynamic groups

Heo, S.; Kim, Z.; Kim, Kwangjo, 50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007, pp.464 - 468, IEEE, 2007-11-26

57
Challenges of Cyber Security for Nuclear Power Plants

Kim, Kwang-Jo, the 18th Pacific Basin Nuclear Conference (PBNC2012), KAIF and KNS, 2012-05-20

58
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker

Choi, Rakyong; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06

59
Comparison of Anonymous Authentication Protocols

Kim, J; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.369 - 372, 한국정보보호학회, 2002-11-16

60
Computing with secrets for mobile agent using one-time proxy signature

Kim, H.; Baek, J.; Lee, B.; Kim, Kwangjo, SCIS2001, pp.845 - 850, 2001-01

Discover

rss_1.0 rss_2.0 atom_1.0