Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 11-20 of 53 (Search time: 0.002 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
11
Highly reliable trust establishment scheme in ad hoc networks

Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08

12
Receipt-free electronic voting scheme with a tamper-resistant randomizer

Lee, Byoungcheon; Kim, Kwangjo, IFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2587, pp.389 - 406, 2002

13
ID-based, blind signature and ring signature from pairings

Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002

14
Design and implementation of an efficient fair off-line E-cash system based on elliptic curve discrete logarithm problem

Lee, Manho; Ahn, Gookwhan; KIm Jinho; Park, Jaekwan; Lee, Byouncheon; Kim, Kwangjo; Lee, Hyukjae, JOURNAL OF COMMUNICATIONS AND NETWORKS, v.4, no.2, pp.81 - 89, 2002-06

15
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01

16
Compact representation of domain parameters of hyperelliptic curve cryptosystems

Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.203 - 213, 2002-06

17
Yet another forward secure signature from bilinear pairings

Vo, Duc-Liem; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.441 - 455, 2006-02

18
Remarks on the unknown key share attacks

Baek, Joonsang; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E83A, no.12, pp.2766 - 2769, 2000-12

19
ID-Based Blind Signature and Ring Signature from Pairings

Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002

20
Mobile RFID applications and security challenges

Konidala, D.M.; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.4296 LNCS, no.0, pp.194 - 205, 2006-11

rss_1.0 rss_2.0 atom_1.0