Results 1-7 of 7 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005 | |
Hardware Stack Design Towards an Effective Defense Against From Pointer Overwriting Attacks Yoon, Hyunsoo; Park, Y; Lee, Y; Kim, H; Lee, GJ; Kim, IH, The 1th International Workshop on Security (IWSEC'06) - LNCS, pp.268 - 277, 2006-09-23 | |
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks Yoon, Hyunsoo; Lee, Y; Kim, H; Chung, B; Park, Y, The International Conference on Information Networking 2007, pp.445 - 448, 2007-01-23 | |
A Fragile Watermakring Scheme For Binary Image Authentication using Hamming Code Lee, Y; Kim, H; Park, Y; Chung, B; Yoon, Hyunsoo, 6th Asia Pacific International Symposium on Information Technology, pp.445 - 448, IEEE, 2007-01 | |
On Demand Secure Routing Protocol for Ad Hoc Network using ID based Cryptosystem Lee, YH; Kim, H; Chung, B; Lee, J; Yoon, Hyunsoo, PDCAT'03, IEEE, 2003-08-01 | |
A new proxy signature scheme providing self-delegation Lee, Y; Kim, H; Park, Y; Yoon, Hyunsoo, ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.328 - 342, Springer Verlag (Germany), 2006-11-30 | |
A Distributed Model for Secure and Scalable Group Communication Kim, H; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.7 - 12, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 |