Browse by Subject ENCRYPTION

Showing results 1 to 12 of 12

1
A certificate-based signature scheme

Kang, BG; Park, JH; Hahn, Sang-Geun, TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.2964, pp.99 - 111, 2004

2
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks

Hur, J; Yoon, Hyunsoo, MOBILE NETWORKS & APPLICATIONS, v.15, pp.680 - 692, 2010-10

3
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Han, Kyusuk; Yeun, Chan Yeob; Shon, Taeshik; Park, Jonghyuk; Kim, Kwangjo, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04

4
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments

Kim, Jangseong; Baek, Joonsang; Zhou, Jianying; Shon, Taeshik, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E95D, no.1, pp.117 - 125, 2012-01

5
Efficient and Secure File Deduplication in Cloud Storage

Shin, Youngjoo; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

6
Efficient Integrity-Tree Structure for Convolutional Neural Networks through Frequent Counter Overflow Prevention in Secure Memories

Kim, Jesung; Lee, Wonyoung; Hong, Jeongkyu; Kim, Soontae, SENSORS, v.22, no.22, 2022-11

7
Generic transformation from weakly to strongly unforgeable signatures

Huang Q.; Wong D.S.; Li J.; Zhao Y.-M., JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, v.23, no.2, pp.240 - 252, 2008

8
Key alternating ciphers based on involutions

Lee, Jooyoung, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05

9
Minimizing the Two-Round Even-Mansour Cipher

Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John, JOURNAL OF CRYPTOLOGY, v.31, no.4, pp.1064 - 1119, 2018-10

10
Reducing the Memory Bandwidth Overheads of Hardware Security Support for Multi-Core Processors

Lee, Jung Hoon; Kim, Taehoon; Huh, Jaehyuk, IEEE TRANSACTIONS ON COMPUTERS, v.65, no.11, pp.3384 - 3397, 2016-11

11
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

12
Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

rss_1.0 rss_2.0 atom_1.0