Browse "School of Computing(전산학부)" by Author Lee, B

Showing results 9 to 18 of 18

9
Lsomorphic strategy for processor allocation in k-ary n-cube systems

Kang, MS; Yu, CS; Youn, HY; Lee, B; Kim, Myungchul, IEEE TRANSACTIONS ON COMPUTERS, v.52, no.5, pp.645 - 657, 2003-05

10
Multi-Certification Signatures and Their Applications to Public Key Infrastructure

Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01

11
Name-based autoconfiguration for mobile ad hoc networks

Kim, N; Kang, S; Lee, Young-Hee; Lee, B; Odu, BO, ETRI JOURNAL, v.28, pp.243 - 246, 2006-04

12
New Receipt-free Voting Scheme Using Double-trapdoor Commitment

Chen, X; Wu, Q; Zhang, F; Wei, B; Lee, B; Lee, H; Kim, Kwangjo, The 8th International Workshop on Information Security Applications, pp.395-409, pp.395 - 409, WISA, 2007-08-27

13
No More Panic in Florida : Reality or Dream?

Kim, Kwangjo; Kim, J; Lee, B, Rump Session of Crypto2001, pp.0 - 0, 2001-08

14
Providing receipt-freeness in mixnet-based voting protocols

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258, 2004

15
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

16
Selective advance reservations based on host movement detection and resource-aware handoff

Lee, K; Kim, Myungchul; Yu, CS; Lee, B; Hong, S, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.19, pp.163 - 184, 2006-03

17
Strong Proxy Signature and its Applications

Lee, B; Kim, H; Kim, Kwangjo, SCIS2001, pp.603 - 608, 2001-01

18
TWIMC: An anonymous recipient E-mail system

Ku, S; Lee, B; Lee, DongMan, DEVELOPMENTS IN APPLIED ARTIFICAIL INTELLIGENCE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, v.2358, pp.363 - 372, 2002

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0