Browse "CS-Conference Papers(학술회의논문)" by Author 1505

Showing results 92 to 151 of 247

92
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

93
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

94
Human Authentication Protocol for Distributed Computing Environment

Duc, DN; Kim, Kwangjo, WISA 2006, pp.367 - 372, WISA, 2006-08

95
Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks

Yoon, S; Asano, T; Kusakawa, M; Lee, H; Kim, Kwangjo, Proceedings of SCIS, Institute of Electronics, Information and Communication Engineers, 2008-01

96
ICAO 규격 전자여권의 보안 문제 조사 분석

지성배; 김광조, CISC-W'07 , pp.449 - 452, Korea Institute of Information Security and Cryptology, 2007-12-01

97
ICU 정보보호 석/박사 과정을 위한 교과과정 연구

천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28

98
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현

한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01

99
ID-Based Distributed 'Magic Ink' Signature

Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21

100
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings

Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22

101
Identity-based secret signature scheme

LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24

102
(Im)Possibility of Denial-of-Service Attacks on Network Layer in Wireless Mesh Networks

유명한; 김광조, CISC-W'09, pp.77 - 81, 2009-12-05

103
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20

104
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004

Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01

105
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

106
Intrusion-Resilient Key-Evolving Schnorr Signature

Kim, Kwangjo; Kim, J, CSS2003, pp.379 - 384, 2003-10

107
IPsec용 차세대 키관리 프로토콜의 동향 및 분석

김진; 이상원; 최철준; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.272 - 275, 한국정보보호학회, 2003-07-04

108
Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity

Kim, Z.; Kim, J.-S.; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, pp.1 - 5, Institute of Electronics, Information and Communication Engineers, 2007-01-23

109
Large-Scale Network Intrusion Detection

Al-Jarrah, O. Y.; Yoo, P. D.; Kim, Kwangjo, UAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, Khalifa University, 2014-05-13

110
Lattice-based Multi-signature with Linear Homomorphism

Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19

111
Lattice-based Threshold Signature with Message Block Sharing

Choi, Rakyong; Kim, Kwangjo, SCIS2014, v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-22

112
Light-weight RFID Tag-Reader Mutual Authentication Scheme

Konidala, D.M.; Kim, Kwangjo, 한국정보보호학회 학술발표회, pp.179 - 194, Korea Institute of Information Security & Cryptology, 2006-09

113
Limited verifier signature scheme from bilinear pairings

Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06

114
Mobile RFID Security Issues

Konidala, D.M.; Kim, Kwangjo, SCIS 2006, pp.166 - 166, Institute of Electronics, Information and Communication Engineers, 2006-01

115
Multi-Certification Signatures and Their Applications to Public Key Infrastructure

Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01

116
Mutual Authentication Protocol for Low-cost RFID

Yang, J; Park, J; Lee, H; Ren, K; Kim, Kwangjo, Workshop on RFID and Lightweight Crypto, pp.17 - 24, WRLC, 2005-07

117
Mutually Authenticated Key Exchange Protocol For Computationally Limited Devices

Kim, Z; Kim, K; Kang, Y, Triangle Symposium on Advanced ICT, TriSAI, 2008-10-06

118
New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP

Han, K; Yoon, C; Kim, K, Triangle Symposium on Advanced ICT 2008, TriSAI, 2008-10-06

119
New Key Escrow Model for the Lawful Interception in 3GPP

Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12

120
New Polymorphic Worm Detection based on Instruction Distribution and Signature

Noh, H; Kim, J; Yeun, C; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01-22

121
New Receipt-free Voting Scheme Using Double-trapdoor Commitment

Chen, X; Wu, Q; Zhang, F; Wei, B; Lee, B; Lee, H; Kim, Kwangjo, The 8th International Workshop on Information Security Applications, pp.395-409, pp.395 - 409, WISA, 2007-08-27

122
New Revocable E-cash based on the limited power of TTP

Xie, Y; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.266 - 269, 한국정보보호학회, 2002-11-16

123
No More Panic in Florida : Reality or Dream?

Kim, Kwangjo; Kim, J; Lee, B, Rump Session of Crypto2001, pp.0 - 0, 2001-08

124
O-FRAP+: Enhancing Security of a Forward secure RFID Authentication Protocol

Duc, D.N.; Kim, Kwangjo, CISC-S'09, pp.406 - 410, Korea Institute of Information Security & Cryptology, 2009-06-05

125
On the design of secure DRM in ubiquitous environment

한규석; 이송원; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20

126
On the Power of Computational Secret Sharing

Kim, Kwangjo; Vinod, V.; Narayanan, A; Srinathan, K.; Rangan, C. P., Indocrypt2003, v.2904, no.0, pp.162 - 176, Springer-Verlag, 2003-12

127
On the Security of NTRUSign signature scheme

Kim, Kwangjo; Min, SJ; Yamamoto, G, SCIS04, pp.625 - 630, SCIS, 2004-01

128
On the Security of Zhang-Wu-Wang's Forward-Secure Group Signature Scheme in ICICS'03

Wang, P; Chen, X; Kim, Kwangjo, 2004년도 한국정보보호학회 하계정보보호학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-06

129
Open issues in RFID security

Duc, D.N.; Lee, H.; Konidala, D.M.; Kim, Kwangjo, International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009-11-09

130
Practical threshold signatures without random oracles

Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007

131
Privacy Challenges in Online Social Network

Lin, Jia-Hua; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06

132
Privacy Preserving Mutual Authentication Protocol for Low-cost RFID

양정규; Ren, K; 최수길; 김광조, 2004년도 한국정보보호학회 충청지부학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-10

133
Provably-Secure Identification Scheme based on Braid Group

Kim, Z; Kim, Kwangjo, SCIS04, pp.29 - 34, 2004-01

134
QoSS의 연구 동향과 적용

함우석; 김종승; 이송원; 박재혁; 최수길; 김광조; 김숙연; et al, 2002년도 한국정보보호학회 학술대회, pp.352 - 355, 한국정보보호학회, 2002-11-16

135
Quorum based algorithms using group choice

Kim, K; Park, JH; Manabe, Y, 2002년도 한국정보보호학회 학술대회, pp.53 - 56, 한국정보보호학회, 2002-11-16

136
Reconsidering Ryu-Takagi RFID authentication protocol

Duc, D.N.; Kim, Kwangjo; Yeun, C.Y., 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, ICITST 2010, 2010-11-08

137
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis

Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10

138
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템

홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03

139
Result of the 1st Worldwide Internet Voting System

Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.219 - 224, 한국정보보호학회, 2002-11-16

140
Revealing the Linkability of Popescue ID-based Group Signature Scheme

Choi, H; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.81 - 83, Korea Institute of Information Security & Cryptology, 2002-11-16

141
RFID mutual Authentication Scheme based on Synchronized Secret Information

Lee, S; Asano, T; Kim, Kwangjo, SCIS 2006, pp.98 - 98, Institute of Electronics, Information and Communication Engineers, 2006-01

142
Rijndael과 Crypton의 향상된 불능 차분 공격

천정희; 김문주; 김광조; 이정연, WISC2001, pp.85 - 93, 2001-10

143
Ring Authenticated Encryption: A New Type of Authenticated Encryption

Lv, J; Ren, K; Chen, X; Kim, Kwangjo, SCIS04, pp.1179 - 1184, 2004-01

144
SCADA용 DNP3 프로토콜의 소규모 실험환경 구축

이동수; 김광조, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

145
Scalable Grouping-proof Protocol for RFID Tags

Duc, Dang Nguyen; Kim, Jangseong; Kim, Kwang-Jo, SCIS2010, SCIS, 2010-01-21

146
Schnorr Signature Scheme with Restricted Signing Capability

Choi, C; Kim, Z; Kim, Kwangjo, CSS2003, pp.385 - 390, 2003-10

147
Secure Approach to Deploy RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12

148
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

149
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks

Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27

150
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

151
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

Discover

rss_1.0 rss_2.0 atom_1.0