Showing results 54 to 113 of 247
BRM sequence generators based on the field GF(2n) for DSP implementations Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17 |
BRM 수열의 상관 공격 방식 김용대; 이상진; 박상준; 고승철; 김광조, KIISC 종합학술발표회, v.3, no.1, pp.41 - 47, KIISC, 1993-11-20 |
Certificateless authenticated Group Key Agreement protocol for dynamic groups Heo, S.; Kim, Z.; Kim, Kwangjo, 50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007, pp.464 - 468, IEEE, 2007-11-26 |
Challenges of Cyber Security for Nuclear Power Plants Kim, Kwang-Jo, the 18th Pacific Basin Nuclear Conference (PBNC2012), KAIF and KNS, 2012-05-20 |
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker Choi, Rakyong; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06 |
Comparison of Anonymous Authentication Protocols Kim, J; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.369 - 372, 한국정보보호학회, 2002-11-16 |
Computing with secrets for mobile agent using one-time proxy signature Kim, H.; Baek, J.; Lee, B.; Kim, Kwangjo, SCIS2001, pp.845 - 850, 2001-01 |
Copyright Protection of Software using Public Key Infrastructure Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, 1999-01 |
Cryptanalysis of ID-Based Remote Authentication with Smart Cards on Open Distributed System from Elliptic Curve Cryptography Vo, DL; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23 |
Cryptanalysis of Kim et al's Traitor tracing scheme on ACISP02 Zhang, F; Kwangjo Kim, 2002년도 한국정보보호학회 학술대회, pp.99 - 101, Korea Institute of Information Security & Cryptology, 2002-11-16 |
Crypto API 연구 동향 김광조, 제6회 개방형 시스템 및 솔루션 전시회, v.0, no.0, pp.0 - 0, 1998-07-10 |
Deep Learning in Intrusion Detection System: An Overview Aminanto, Erza; Kim, Kwangjo, 2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, Higher Education Forum, 2016-06 |
DES can be Immune to Linear Cryptanalysis Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994 |
Design and Implementation of Internet Voting System to the Worldwide level Kim, Kwangjo, WOTE2001, pp.0 - 0, 2001-08-28 |
Design and Implementation of Secure Tapping Alert Protocol Kim, Kwangjo; Ahn, G, WISA2001, pp.103 - 121, WISA, 2001-09-01 |
Design of an RFID-embedded e-ID System for Privacy Protection Ji, S; Kim, Z; Kim, Kwangjo, Proceedings of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Design of Intrusion Detection System Preventing Insider Attack Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24 |
Design of secure VoIP using ID-Based Cryptosystem Han, K; Yeun, C; Kim, K, Proc. Of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Design of Threshold Blind Signature Scheme Vo, DL; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.37 - 42, 한국정보보호학회, 2003-07-04 |
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20 |
Efficient Forward Secure Signature from Bilinear Pairings Vo, DL; Kim, Kwangjo, 2005년 한국정보보호학회 동계정보보호학술대회, pp.32 - 38, Korea Institute of Information Security & Cryptology, 2005-12-03 |
Efficient Offline Path Validation Lee, B; Kim, Kwangjo; Seo, M; Huh, W, IWAP2001, pp.117 - 125, 2001-10 |
Electronic Cash System Based on Group Signatures with Revokable Anonymity Choi, H; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.29 - 34, 한국정보보호학회영남지부, 2003-02-21 |
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 |
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning Duc, DN; Park, J; Lee, H; Kim, Kwangjo, SCIS 2006, pp.97 - 97, Institute of Electronics, Information and Communication Engineers, 2006-01 |
EPON의 보안요구사항과 QoSS의 적용 Park, JH; Kim, Kwangjo; Ryu, T; Han, K, 2003년도 한국정보보호학회 충청지부학술대회, pp.251 - 259, 한국정보보호학회, 2003-08-22 |
Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks Kim, Kyung Min; Hong, Jina; Kim, Kwangjo; Yoo, Paul, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20 |
Evaluation of public datasets for intrusion detection/prevention system benchmark Huseynov, Khalid; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 |
Experimental Design of Worldwide Internet Voting System using PKI Kim, Kwangjo; Kim, J; Lee, B; Ahn, G, SSGRR2001, pp.0 - 0, SSGRR, 2001-08 |
Exploring Signature Schemes with Subliminal Channel Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01 |
Extension of Votopia to Mobile Voting Lee, H; Vo, DL; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.225 - 229, 한국정보보호학회, 2002-11-16 |
Fair Exchange of Digital Signatures Using Conditional Signature Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security 2002, pp.179 - 184, Institute of Electronics, Information and Communication Engineers, 2002-01 |
Fair Tracing based on VSS and Blind Signauture without Trustees Kim, BG; Min, S; Kim, Kwangjo, CSS 2003, pp.37 - 42, CSS, 2003-10-29 |
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04 |
Generic on-line/off-line aggregate signatures Wu, C.; Xing, Y.; Chen, X.; Long, D.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.107 - 112, IEEE, 2008-07-29 |
Generic security-amplifying methods of ordinary digital signatures Li, J.; Kim, Kwangjo; Zhang, F.; Wong, D.S., 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, pp.224 - 241, Springer Verlag (Germany), 2008-06-03 |
Group Mutual Exlusion based Secure Distributed Protocol Park, J; Gang, S; Kim, Kwangjo, CSS2003, pp.445 - 450, 2003-10 |
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05 |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 |
How to Use Exponent Permutations in Cryptography-classification and Applications Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19 |
Human Authentication Protocol for Distributed Computing Environment Duc, DN; Kim, Kwangjo, WISA 2006, pp.367 - 372, WISA, 2006-08 |
Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks Yoon, S; Asano, T; Kusakawa, M; Lee, H; Kim, Kwangjo, Proceedings of SCIS, Institute of Electronics, Information and Communication Engineers, 2008-01 |
ICAO 규격 전자여권의 보안 문제 조사 분석 지성배; 김광조, CISC-W'07 , pp.449 - 452, Korea Institute of Information Security and Cryptology, 2007-12-01 |
ICU 정보보호 석/박사 과정을 위한 교과과정 연구 천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28 |
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현 한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01 |
ID-Based Distributed 'Magic Ink' Signature Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21 |
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22 |
Identity-based secret signature scheme LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24 |
(Im)Possibility of Denial-of-Service Attacks on Network Layer in Wireless Mesh Networks 유명한; 김광조, CISC-W'09, pp.77 - 81, 2009-12-05 |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20 |
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004 Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Integer Addition over GF(2) and its Cryptographic Properties Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11 |
Intrusion-Resilient Key-Evolving Schnorr Signature Kim, Kwangjo; Kim, J, CSS2003, pp.379 - 384, 2003-10 |
IPsec용 차세대 키관리 프로토콜의 동향 및 분석 김진; 이상원; 최철준; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.272 - 275, 한국정보보호학회, 2003-07-04 |
Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity Kim, Z.; Kim, J.-S.; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, pp.1 - 5, Institute of Electronics, Information and Communication Engineers, 2007-01-23 |
Large-Scale Network Intrusion Detection Al-Jarrah, O. Y.; Yoo, P. D.; Kim, Kwangjo, UAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, Khalifa University, 2014-05-13 |
Lattice-based Multi-signature with Linear Homomorphism Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19 |
Lattice-based Threshold Signature with Message Block Sharing Choi, Rakyong; Kim, Kwangjo, SCIS2014, v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-22 |
Light-weight RFID Tag-Reader Mutual Authentication Scheme Konidala, D.M.; Kim, Kwangjo, 한국정보보호학회 학술발표회, pp.179 - 194, Korea Institute of Information Security & Cryptology, 2006-09 |
Limited verifier signature scheme from bilinear pairings Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06 |
Discover