Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-6 of 6 (Search time: 0.003 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
The ring authenticated encryption scheme - How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01

2
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01

3
The ring authenticated encryption scheme – How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009

4
Forward Secure ID-based Group Key Agreement Protocol with Anonymity

Park, Hyewon; Kim, Zeen; Kim, Kwangjo, Third International Conference on Emerging Security Information, Systems and Technologies, pp.274-279, 2009-06-18

5
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks

Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

6
Design of Intrusion Detection System Preventing Insider Attack

Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

rss_1.0 rss_2.0 atom_1.0