Results 61-70 of 86 (Search time: 0.006 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Forward Secure ID-based Group Key Agreement Protocol with Anonymity Park, Hyewon; Kim, Zeen; Kim, Kwangjo, Third International Conference on Emerging Security Information, Systems and Technologies, pp.274-279, 2009-06-18 | |
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24 | |
Efficient generic on-line/off-line (threshold) signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo, INFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203, 2008-11 | |
Receipt-free Electronic Voting Scheme with A Tamper-Resistant Randomizer Lee, Byoungcheon; Kim, Kwangjo, ICISC, 2002 | |
Security analysis of an ID-based key agreement for peer group communication Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11 | |
A universal forgery on Araki et al.s convertible limited verifier signature scheme Zhang, Fangguo; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E86A, pp.515 - 516, 2003-02 | |
A Scalable and Untraceable Authentication Protocol for RFID Seo, Youngjoon; Lee, Hyunrok; Kim, Kwangjo, 2011-07-22 | |
Secure MatchMaking Protocols Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12 | |
Design of Intrusion Detection System Preventing Insider Attack Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24 | |
Chameleon hashing without key exposure Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.87 - 98, 2004 |
Discover