Showing results 3 to 62 of 247
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments Konidala, D.M; Duc, D.N; Lee, DongMan; Kim, Kwangjo, Pervasive Computing and Communications Workshops, 2005, pp.136 - 140, 2005-03 |
A capability-based privacy-preserving scheme for pervasive computing environments Konidala, D.M.; Duc, D.N.; Lee, D.; Kim, Kwangjo, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, pp.136 - 140, IEEE, 2005-03-08 |
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments Konidala, D.M.; Duc, D.N.; Lee, DongMan; Kim, K, 2004년도 한국정보보호학회 하계정보보호학술대회, pp.0 - 0, 한국정보보호학회, 2004-06 |
A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN Ahn, Soohyun; Kim, Hakju; Jeong, Jeseong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-22 |
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption Duc, DN; Cheon, JH; Kim, Kwangjo, ICICS03, v.2971, no.0, pp.11 - 21, Springer-Verlag, 2003-10 |
A Framework of Consolidated Authorization Management in e-SCM Hong, Seung-Phil; Kim, Myungchul; Kim, Kwangjo; Kim, Jinho, Conference on Applied Cryptography and Network Security, pp.0 - 0, 2003-10 |
A Lightweight Authentication Protocol based on Universal Re-encryption of RFID Tags 서영준; 이현록; 김광조, 한국정보보호학회 동계정보보호학술대회, pp.207 - 212, Korea Institute of Information Security & Cryptology, 2006-12-09 |
A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment Kim, Jangseong; Kim, Zeen; Kim, Kwangjo, 10th International Conference on Information Security and Cryptology (ICISC 2007), v.4817, pp.37 - 48, Springer Verlag (Germany), 2007-11-29 |
A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags Seo, Y; Asano, T; Lee, H; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01 |
A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment Kim, Jangseong; Kim, Kwangjo, WISA 2008, v.5379, WISA, 2008-09-23 |
A Micro-payment System for Multiple-Shopping Lee, M; Kim, Kwangjo, SCIS2002, pp.229 - 234, Institute of Electronics, Information and Communication Engineers, 2002 |
A New Approach of X.509v3 Certificate for Full Path Validation Park, J; Kim, Kwangjo, SCIS2002, pp.1155 - 1160, SCIS, 2002-01-29 |
A new ID-based Group Signature scheme from bilinear pairings Chen, X; Zhang, F; Kim, Kwangjo, WISA2003, pp.585 - 592, 2003-08 |
A New Identification Scheme based on the Gap Diffie-Hellman Problem Kim, M; Kim, Kwangjo, SCIS2002, pp.349 - 352, SCIS, 2002-01 |
A New Provably Secure Transitive Signature Scheme Kim, Kwangjo; Duc, D.N.; Kim, Z, SCIS, pp.0 - 0, SCIS, 2005-01 |
A new receipt-free voting scheme based on linkable ring signature for designated verifiers Chen, G.; Wu, C.; Han, W.; Chen, X.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.18 - 23, IEEE, 2008-07-29 |
A New Threshold Blind Signature Scheme from Pairings Vo, DL; Zhang, F; Kim, Kwangjo, SCIS2003, pp.233 - 238, SCIS, 2003-01 |
A New Transitive Signature Scheme based on RSA-based Security Assumptions Duc, D.N.; Han, K; Kim, Z; Kim, Kwangjo, ACNS2005, pp.165 - 175, ACNS, 2005-06-07 |
A privacy-preserving kid's safety care service based on sensor network in u-City Kim, Jangseong; Yoo, Myunghan; Kim, Kwang-Jo, SCIS2010, SCIS, 2010-01-20 |
A Proposed Software Protection Scheme Wang , P; Kim, Kwangjo, 2004년도 한국정보보호학회 충청지부학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-10 |
A Protocol of Unlinkable Transaction for Preserving Customer Privacy Kang, S; Asano, T; Kim, Kwangjo, SCIS, Institute of Electronics, Information and Communication Engineers, 2005-01 |
A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment Kim, Kwangjo; Divyan, K.M.; Deng, R.H.; Zhou, J, SCIS04, pp.931 - 936, SCIS, 2004-01 |
A secure and privacy enhanced protocol for location-based services in ubiquitous society Konidala, D.M.; Yeun, C.Y.; Kim, Kwangjo, GLOBECOM'04 - IEEE Global Telecommunications Conference, v.4, pp.2164 - 2168, 2004-11-29 |
A Secure Clustering Scheme over an Energy aware Routing Protocol for Monitoring Critical Conditions Yoo, M; Kim, J; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01 |
A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment Divyan, K.M.; Kim, Kwangjo, 2003년도 한국정보보호학회 동계학술대회, pp.669 - 685, 한국정보보호학회, 2003-12-06 |
A Secure On-line Lottery using Bank as a notary Ham, W; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.121 - 124, 한국정보보호학회, 2002-11-16 |
A Secure RFID Reader Protocol based on SLRRP Lee, H; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23 |
A Secure Testament Revealing Protocol Han, K; Zhang, F; Kim, J; Kim, Kwangjo, SCIS2003, pp.399 - 404, SCIS, 2003-01 |
A Securely Transferable Ebooks using Public-Key Infrastructure 김명선; 김종승; 이정연; 김광조, 2001년도 한국정보보호학회 종합학술 발표대회, pp.371 - 374, 한국정보보호학회, 2001-11-24 |
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Konidala, DM.; Kim, Z; Kim, Kwangjo, International Conference on RFID Security 2007 (RFIDSec 07),, pp.141 - 152, RFIDSec, 2007-07-11 |
A Simple Secure Communication Protocol for RFID Devices Duc, DN; Park, J; Lee, H; Kwangjo Kim, 2005년 한국정보보호학회 동계정보보호학술대회, pp.254 - 259, Korea Institute of Information Security & Cryptology, 2005-12-03 |
A study on Secret Sharing Scheme Using Visual Cryoptography Kim, MR; Park, JH; Park, SW; Kim, Kwangjo, SCIS97, 1997-01-29 |
Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6 Choi, S; Abe, M; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.495 - 498, 한국정보보호학회, 2002-11-16 |
AES에 대한 DPA 대응방안 개선 장화선; 김광조, 2003년도 한국정보보호학회 충청지부학술대회, pp.3 - 10, 한국정보보호학회, 2003-08-22 |
AES에 대한 오류기반 공격 장화선; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.138 - 141, 한국정보보호학회, 2003-07-04 |
Aggregate proxy signature and verifiably encrypted proxy signature Li, J.; Kim, Kwangjo; Zhang, F.; Chen, X., 1st International Conference on Provable Security 2007, ProvSec 2007, pp.208 - 217, Springer Verlag (Germany), 2007-11-01 |
An Adaptive Authentication Protocol based on Reputation for Peer-to-Peer System Lee, H; Kim, Kwangjo, SCIS2003, pp.661 - 666, SCIS, 2003-01 |
An Attack on Tanaka`s Non Interactive Key Sharing Scheme Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17 |
An Efficient and Privacy Preserving Authentication Protocol for HAN Chung, Doyoung; Dwijaksara, Made Harta; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27 |
An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks Yim, J; Choi, I; Kim, Kwangjo, The 10th International Workshop on Information Security Applications (WISA 2009), 2009-08-24 |
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24 |
An enhanced lightweight authentication protocol for access control in wireless LANs Ren, K.; Lee, H.; Han, K.; Park, J.; Kim, Kwangjo, 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity, v.2, pp.444 - 450, IEEE, 2004-11-16 |
Analysis of NTRUSign signature scheme Min, SJ; Kim, Kwangjo; Yamamoto, G, 2003년도 한국정보보호학회 동계학술대회, pp.399 - 405, 한국정보보호학회, 2003-12-06 |
Analysis on Popescu's Group Signature Scheme for Large Groups Choi, H; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.43 - 46, 한국정보보호학회, 2003-07-04 |
Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices Kim, J; Choi, S; Kim, Kwangjo; Boyd, C, SCIS2003, pp.405 - 410, SCIS, 2003-01 |
Applying PKI for Internet Voting System 김진호; 김광조; 이병천, 2001년도 한국정보보호학회 종합학술 발표대회, pp.318 - 321, Korea Institute of Information Security & Cryptology, 2001-11-24 |
Arduino를 이용한 CAN의 소규모 실험 환경 구축 및 보안 취약성 검증 안수현; 김광조, CISC-S'15, v.0, 한국정보보호학회, 2015-06-25 |
Asian Academic Activities in Information Security and Cryptography Kim, Kwang-Jo, IEEE ICITIS2010, IEEE, 2010-12-18 |
Authenticated and DoS-resilient channel assignment mechanism for wireless mesh networks Shin, Sungmok; Yim, Junhyun; Kim, Kwang-Jo, SCIS2010, SCIS, 2010-01-20 |
Authentication and Payment Protocol Preserving Location Privacy in Mobile IP Choi, S.; Kim, Kwangjo, IEEE Global Telecommunications Conference GLOBECOM'03, v.3, pp.1410 - 1414, IEEE, 2003-12-01 |
Auto-ID Lab을 통한 RFID 보안기술 연구동향 이현록; 김광조, 한국정보보호학회 영남지부 학술대회, pp.151 - 157, 한국정보보호학회, 2006-02-23 |
BRM sequence generators based on the field GF(2n) for DSP implementations Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17 |
BRM 수열의 상관 공격 방식 김용대; 이상진; 박상준; 고승철; 김광조, KIISC 종합학술발표회, v.3, no.1, pp.41 - 47, KIISC, 1993-11-20 |
Certificateless authenticated Group Key Agreement protocol for dynamic groups Heo, S.; Kim, Z.; Kim, Kwangjo, 50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007, pp.464 - 468, IEEE, 2007-11-26 |
Challenges of Cyber Security for Nuclear Power Plants Kim, Kwang-Jo, the 18th Pacific Basin Nuclear Conference (PBNC2012), KAIF and KNS, 2012-05-20 |
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker Choi, Rakyong; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06 |
Comparison of Anonymous Authentication Protocols Kim, J; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.369 - 372, 한국정보보호학회, 2002-11-16 |
Computing with secrets for mobile agent using one-time proxy signature Kim, H.; Baek, J.; Lee, B.; Kim, Kwangjo, SCIS2001, pp.845 - 850, 2001-01 |
Copyright Protection of Software using Public Key Infrastructure Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, 1999-01 |
Cryptanalysis of ID-Based Remote Authentication with Smart Cards on Open Distributed System from Elliptic Curve Cryptography Vo, DL; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23 |
Discover