Showing results 65 to 124 of 247
Deep Learning in Intrusion Detection System: An Overview Aminanto, Erza; Kim, Kwangjo, 2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, Higher Education Forum, 2016-06 |
DES can be Immune to Linear Cryptanalysis Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994 |
Design and Implementation of Internet Voting System to the Worldwide level Kim, Kwangjo, WOTE2001, pp.0 - 0, 2001-08-28 |
Design and Implementation of Secure Tapping Alert Protocol Kim, Kwangjo; Ahn, G, WISA2001, pp.103 - 121, WISA, 2001-09-01 |
Design of an RFID-embedded e-ID System for Privacy Protection Ji, S; Kim, Z; Kim, Kwangjo, Proceedings of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Design of Intrusion Detection System Preventing Insider Attack Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24 |
Design of secure VoIP using ID-Based Cryptosystem Han, K; Yeun, C; Kim, K, Proc. Of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Design of Threshold Blind Signature Scheme Vo, DL; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.37 - 42, 한국정보보호학회, 2003-07-04 |
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20 |
Efficient Forward Secure Signature from Bilinear Pairings Vo, DL; Kim, Kwangjo, 2005년 한국정보보호학회 동계정보보호학술대회, pp.32 - 38, Korea Institute of Information Security & Cryptology, 2005-12-03 |
Efficient Offline Path Validation Lee, B; Kim, Kwangjo; Seo, M; Huh, W, IWAP2001, pp.117 - 125, 2001-10 |
Electronic Cash System Based on Group Signatures with Revokable Anonymity Choi, H; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.29 - 34, 한국정보보호학회영남지부, 2003-02-21 |
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 |
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning Duc, DN; Park, J; Lee, H; Kim, Kwangjo, SCIS 2006, pp.97 - 97, Institute of Electronics, Information and Communication Engineers, 2006-01 |
EPON의 보안요구사항과 QoSS의 적용 Park, JH; Kim, Kwangjo; Ryu, T; Han, K, 2003년도 한국정보보호학회 충청지부학술대회, pp.251 - 259, 한국정보보호학회, 2003-08-22 |
Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks Kim, Kyung Min; Hong, Jina; Kim, Kwangjo; Yoo, Paul, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20 |
Evaluation of public datasets for intrusion detection/prevention system benchmark Huseynov, Khalid; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 |
Experimental Design of Worldwide Internet Voting System using PKI Kim, Kwangjo; Kim, J; Lee, B; Ahn, G, SSGRR2001, pp.0 - 0, SSGRR, 2001-08 |
Exploring Signature Schemes with Subliminal Channel Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01 |
Extension of Votopia to Mobile Voting Lee, H; Vo, DL; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.225 - 229, 한국정보보호학회, 2002-11-16 |
Fair Exchange of Digital Signatures Using Conditional Signature Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security 2002, pp.179 - 184, Institute of Electronics, Information and Communication Engineers, 2002-01 |
Fair Tracing based on VSS and Blind Signauture without Trustees Kim, BG; Min, S; Kim, Kwangjo, CSS 2003, pp.37 - 42, CSS, 2003-10-29 |
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04 |
Generic on-line/off-line aggregate signatures Wu, C.; Xing, Y.; Chen, X.; Long, D.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.107 - 112, IEEE, 2008-07-29 |
Generic security-amplifying methods of ordinary digital signatures Li, J.; Kim, Kwangjo; Zhang, F.; Wong, D.S., 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, pp.224 - 241, Springer Verlag (Germany), 2008-06-03 |
Group Mutual Exlusion based Secure Distributed Protocol Park, J; Gang, S; Kim, Kwangjo, CSS2003, pp.445 - 450, 2003-10 |
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05 |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 |
How to Use Exponent Permutations in Cryptography-classification and Applications Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19 |
Human Authentication Protocol for Distributed Computing Environment Duc, DN; Kim, Kwangjo, WISA 2006, pp.367 - 372, WISA, 2006-08 |
Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks Yoon, S; Asano, T; Kusakawa, M; Lee, H; Kim, Kwangjo, Proceedings of SCIS, Institute of Electronics, Information and Communication Engineers, 2008-01 |
ICAO 규격 전자여권의 보안 문제 조사 분석 지성배; 김광조, CISC-W'07 , pp.449 - 452, Korea Institute of Information Security and Cryptology, 2007-12-01 |
ICU 정보보호 석/박사 과정을 위한 교과과정 연구 천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28 |
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현 한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01 |
ID-Based Distributed 'Magic Ink' Signature Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21 |
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22 |
Identity-based secret signature scheme LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24 |
(Im)Possibility of Denial-of-Service Attacks on Network Layer in Wireless Mesh Networks 유명한; 김광조, CISC-W'09, pp.77 - 81, 2009-12-05 |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20 |
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004 Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Integer Addition over GF(2) and its Cryptographic Properties Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11 |
Intrusion-Resilient Key-Evolving Schnorr Signature Kim, Kwangjo; Kim, J, CSS2003, pp.379 - 384, 2003-10 |
IPsec용 차세대 키관리 프로토콜의 동향 및 분석 김진; 이상원; 최철준; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.272 - 275, 한국정보보호학회, 2003-07-04 |
Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity Kim, Z.; Kim, J.-S.; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, pp.1 - 5, Institute of Electronics, Information and Communication Engineers, 2007-01-23 |
Large-Scale Network Intrusion Detection Al-Jarrah, O. Y.; Yoo, P. D.; Kim, Kwangjo, UAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, Khalifa University, 2014-05-13 |
Lattice-based Multi-signature with Linear Homomorphism Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19 |
Lattice-based Threshold Signature with Message Block Sharing Choi, Rakyong; Kim, Kwangjo, SCIS2014, v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-22 |
Light-weight RFID Tag-Reader Mutual Authentication Scheme Konidala, D.M.; Kim, Kwangjo, 한국정보보호학회 학술발표회, pp.179 - 194, Korea Institute of Information Security & Cryptology, 2006-09 |
Limited verifier signature scheme from bilinear pairings Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06 |
Mobile RFID Security Issues Konidala, D.M.; Kim, Kwangjo, SCIS 2006, pp.166 - 166, Institute of Electronics, Information and Communication Engineers, 2006-01 |
Multi-Certification Signatures and Their Applications to Public Key Infrastructure Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01 |
Mutual Authentication Protocol for Low-cost RFID Yang, J; Park, J; Lee, H; Ren, K; Kim, Kwangjo, Workshop on RFID and Lightweight Crypto, pp.17 - 24, WRLC, 2005-07 |
Mutually Authenticated Key Exchange Protocol For Computationally Limited Devices Kim, Z; Kim, K; Kang, Y, Triangle Symposium on Advanced ICT, TriSAI, 2008-10-06 |
New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP Han, K; Yoon, C; Kim, K, Triangle Symposium on Advanced ICT 2008, TriSAI, 2008-10-06 |
New Key Escrow Model for the Lawful Interception in 3GPP Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12 |
New Polymorphic Worm Detection based on Instruction Distribution and Signature Noh, H; Kim, J; Yeun, C; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01-22 |
New Receipt-free Voting Scheme Using Double-trapdoor Commitment Chen, X; Wu, Q; Zhang, F; Wei, B; Lee, B; Lee, H; Kim, Kwangjo, The 8th International Workshop on Information Security Applications, pp.395-409, pp.395 - 409, WISA, 2007-08-27 |
New Revocable E-cash based on the limited power of TTP Xie, Y; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.266 - 269, 한국정보보호학회, 2002-11-16 |
No More Panic in Florida : Reality or Dream? Kim, Kwangjo; Kim, J; Lee, B, Rump Session of Crypto2001, pp.0 - 0, 2001-08 |
O-FRAP+: Enhancing Security of a Forward secure RFID Authentication Protocol Duc, D.N.; Kim, Kwangjo, CISC-S'09, pp.406 - 410, Korea Institute of Information Security & Cryptology, 2009-06-05 |
Discover