Results 1-6 of 6 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
The ring authenticated encryption scheme - How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01 | |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01 | |
The ring authenticated encryption scheme – How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009 | |
Forward Secure ID-based Group Key Agreement Protocol with Anonymity Park, Hyewon; Kim, Zeen; Kim, Kwangjo, Third International Conference on Emerging Security Information, Systems and Technologies, pp.274-279, 2009-06-18 | |
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24 | |
Design of Intrusion Detection System Preventing Insider Attack Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24 |
Discover