Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-4 of 4 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002

2
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Han, Kyusuk; Kim, Kwangjo; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

3
Highly reliable trust establishment scheme in ad hoc networks

Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08

4
A novel privacy preserving authentication and access control scheme for pervasive computing environments

Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07

rss_1.0 rss_2.0 atom_1.0