Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-5 of 5 (Search time: 0.012 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Efficient ID-based blind signature and proxy signature from bilinear pairings

Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323, 2003

2
An efficient tree-based group key agreement using bilinear map

Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2846, pp.357 - 371, 2003

3
ID-based, blind signature and ring signature from pairings

Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002

4
Receipt-free electronic auction schemes using homomorphic encryption

Chen, Xiaofeng; Lee, Byoungcheon; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.259 - 273, 2004

5
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12

rss_1.0 rss_2.0 atom_1.0