Results 1-4 of 4 (Search time: 0.006 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002 | |
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks Han, Kyusuk; Kim, Kwangjo; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02 | |
Highly reliable trust establishment scheme in ad hoc networks Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08 | |
A novel privacy preserving authentication and access control scheme for pervasive computing environments Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07 |
Discover