Showing results 1 to 3 of 3
Cryptanalysis of Lee-Hwang-Lis key authentication scheme Zhang, Fangguo; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.161, pp.101 - 107, 2005-02 |
Rogue public key registration attack and the importance of proof of possession in the PKI environment Lee, Younho; Park, Yongsu; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455, 2006-08 |
Security analysis of an ID-based key agreement for peer group communication Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11 |
Discover