Showing results 1 to 18 of 18
A semantic service discovery network for large-scale ubiquitous computing environments Kang, S; Kim, D; Lee, Young-Hee; Hyun, SoonJoo; Lee, DongMan; Lee, B, ETRI JOURNAL, v.29, pp.545 - 558, 2007-10 |
Copyright Protection of Software using Public Key Infrastructure Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, 1999-01 |
Dynamic voltage scaling techniques for power efficient video decoding Lee, B; Nurvitadhi, E; Dixit, R; Yu, CS; Kim, Myungchul, JOURNAL OF SYSTEMS ARCHITECTURE, v.51, no.10-11, pp.633 - 652, 2005-10 |
Efficient Offline Path Validation Lee, B; Kim, Kwangjo; Seo, M; Huh, W, IWAP2001, pp.117 - 125, 2001-10 |
Experimental Design of Worldwide Internet Voting System using PKI Kim, Kwangjo; Kim, J; Lee, B; Ahn, G, SSGRR2001, pp.0 - 0, SSGRR, 2001-08 |
Exploring Signature Schemes with Subliminal Channel Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01 |
Fair Exchange of Digital Signatures Using Conditional Signature Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security 2002, pp.179 - 184, Institute of Electronics, Information and Communication Engineers, 2002-01 |
Four-ary tree-based barrier synchronization for 2D meshes without nonmember involvement Moh, S; Yu, CS; Lee, B; Youn, HY; Han, Dongsoo; Lee, DongMan, IEEE TRANSACTIONS ON COMPUTERS, v.50, no.8, pp.811 - 823, 2001-08 |
Lsomorphic strategy for processor allocation in k-ary n-cube systems Kang, MS; Yu, CS; Youn, HY; Lee, B; Kim, Myungchul, IEEE TRANSACTIONS ON COMPUTERS, v.52, no.5, pp.645 - 657, 2003-05 |
Multi-Certification Signatures and Their Applications to Public Key Infrastructure Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01 |
Name-based autoconfiguration for mobile ad hoc networks Kim, N; Kang, S; Lee, Young-Hee; Lee, B; Odu, BO, ETRI JOURNAL, v.28, pp.243 - 246, 2006-04 |
New Receipt-free Voting Scheme Using Double-trapdoor Commitment Chen, X; Wu, Q; Zhang, F; Wei, B; Lee, B; Lee, H; Kim, Kwangjo, The 8th International Workshop on Information Security Applications, pp.395-409, pp.395 - 409, WISA, 2007-08-27 |
No More Panic in Florida : Reality or Dream? Kim, Kwangjo; Kim, J; Lee, B, Rump Session of Crypto2001, pp.0 - 0, 2001-08 |
Providing receipt-freeness in mixnet-based voting protocols Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258, 2004 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Selective advance reservations based on host movement detection and resource-aware handoff Lee, K; Kim, Myungchul; Yu, CS; Lee, B; Hong, S, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.19, pp.163 - 184, 2006-03 |
Strong Proxy Signature and its Applications Lee, B; Kim, H; Kim, Kwangjo, SCIS2001, pp.603 - 608, 2001-01 |
TWIMC: An anonymous recipient E-mail system Ku, S; Lee, B; Lee, DongMan, DEVELOPMENTS IN APPLIED ARTIFICAIL INTELLIGENCE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, v.2358, pp.363 - 372, 2002 |
Discover