Results 11-20 of 53 (Search time: 0.002 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Highly reliable trust establishment scheme in ad hoc networks Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08 | |
Receipt-free electronic voting scheme with a tamper-resistant randomizer Lee, Byoungcheon; Kim, Kwangjo, IFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2587, pp.389 - 406, 2002 | |
ID-based, blind signature and ring signature from pairings Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002 | |
Design and implementation of an efficient fair off-line E-cash system based on elliptic curve discrete logarithm problem Lee, Manho; Ahn, Gookwhan; KIm Jinho; Park, Jaekwan; Lee, Byouncheon; Kim, Kwangjo; Lee, Hyukjae, JOURNAL OF COMMUNICATIONS AND NETWORKS, v.4, no.2, pp.81 - 89, 2002-06 | |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01 | |
Compact representation of domain parameters of hyperelliptic curve cryptosystems Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.203 - 213, 2002-06 | |
Yet another forward secure signature from bilinear pairings Vo, Duc-Liem; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.441 - 455, 2006-02 | |
Remarks on the unknown key share attacks Baek, Joonsang; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E83A, no.12, pp.2766 - 2769, 2000-12 | |
ID-Based Blind Signature and Ring Signature from Pairings Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002 | |
Mobile RFID applications and security challenges Konidala, D.M.; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.4296 LNCS, no.0, pp.194 - 205, 2006-11 |
Discover