Results 11-20 of 20 (Search time: 0.005 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Efficient and Secure File Deduplication in Cloud Storage Shin, Youngjoo; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02 | |
Identity-based chameleon hashing and signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05 | |
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection Aminanto, Muhamad Erza; Choi, Rakyong; Tanuwidjaja, Harry Chandra; Yoo, Paul D.; Kim, Kwangjo, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.13, no.3, pp.621 - 636, 2018-03 | |
A Scalable and Untraceable Authentication Protocol for RFID Seo, Youngjoon; Lee, Hyunrok; Kim, Kwangjo, 2011-07-22 | |
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01 | |
Differentially private client-side data deduplication protocol for cloud storage services Shin, Youngjoo; Kim, Kwangjo, SECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08 | |
eMotion: An SGX extension for migrating enclaves Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; Kim, Kwangjo, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01 | |
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection Omar Y. Al-Jarrah; Omar Alhussein; Paul D. Yoo; Sami Muhaidat; Taha, K.; Kim, Kwangjo, IEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08 | |
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12 | |
Post-quantum security of IGE mode encryption in Telegram Lee, Jeeun; Kim, Sungsook; Lee, Seunghyun; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS AND COMPUTER SCIENCES, v.E102-A, no.1, pp.148 - 151, 2019-01 |
Discover