Browse "CS-Journal Papers(저널논문)" by Author Kim, Kwang-Jo

Showing results 1 to 12 of 12

1
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment

Kim, Jang-Seong; Kim, Kwang-Jo; Park, Jong-Hyuk; Shon, Tae-Shik, MATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.45 - 57, 2012-01

2
A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks

Kim, Jang-Seong; Kim, Kwang-Jo, TELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1377 - 1388, 2013-02

3
A scalable and untraceable authentication protocol for RFID

Seo, Young-Joon; Lee, Hyun-Rok; Kim, Kwang-Jo, EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.252 - 261, 2006-08

4
A secure mutual authentication scheme with key agreement using smart card from bilinear pairings

Vo, Duc-Liem; Kim, Kwang-Jo, COMPUTER SYSTEMS SCIENCE AND ENGINEERING, v.23, no.3, pp.139 - 151, 2008-05

5
A Survey on RFID Security and Provably Secure RFID Grouping-proof Protocols

Duc, Dang Nguyen; Konidala, Divyan M.; Lee, Hyun-Rok; Kim, Kwang-Jo, International Journal of Internet Technology and Secured Transactions, v.2, no.3-4, pp.222 - 249, 2010

6
Defending RFID authentication protocols against DoS attacks

Dang Nguyen Duc; Kim, Kwang-Jo, COMPUTER COMMUNICATIONS, v.34, no.3, pp.384 - 390, 2011-03

7
Efficient Mobile Sensor Authentication In Smart Home and WPAN

Han, Kyu-Suk; Shon, Tae-Shik; Kim, Kwang-Jo, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.56, pp.591 - 596, 2010-05

8
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings

Vo, Duc-Liem; Lee, Hyun-Rok; Yeun, Chan-Yeob; Kim, Kwang-Jo, COMPUTERS & ELECTRICAL ENGINEERING, v.36, pp.155 - 159, 2010-01

9
Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

Han, Kyu-Suk; Kim, Kwang-Jo; Shon, Tae-Shik, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E94D, no.6, pp.1181 - 1184, 2011-06

10
Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment

Kim, Jang-Seong; Shon, Tae-Shik; Kim, Kwang-Jo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.3, pp.686 - 689, 2011-03

11
New receipt-free voting scheme using double-trapdoor commitment

Chen, Xiaofeng; Wu, Qianhong; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Lee, Byoung-Cheon; Lee, Hyun-Rok; et al, INFORMATION SCIENCES, v.181, no.8, pp.1493 - 1502, 2011-04

12
Reconsidering Ryu-Takagi RFID Authentication Protocol

Duc, Dang Nguyen; Yeun, Chan Yeob; Kim, Kwang-Jo, International Journal of Intelligent Computing Research (IJICR), v.1, no.4, 2011

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0