Showing results 1 to 3 of 3
Authenticated public key broadcast encryption scheme secure against insiders attack Park, Chanil; Hur, Junbeom; Hwang, Seongoun; Yoon, Hyunsoo, MATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.113 - 122, 2012-01 |
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11 |
웹 환경 분석을 통한 공격 분류 = An approach to web attack categorizationlink 서정석; Seo, Jeong-Seok; et al, 한국과학기술원, 2002 |
Discover