Browse "CS-Conference Papers(학술회의논문)" by Author 1505

Showing results 56 to 115 of 247

56
Certificateless authenticated Group Key Agreement protocol for dynamic groups

Heo, S.; Kim, Z.; Kim, Kwangjo, 50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007, pp.464 - 468, IEEE, 2007-11-26

57
Challenges of Cyber Security for Nuclear Power Plants

Kim, Kwang-Jo, the 18th Pacific Basin Nuclear Conference (PBNC2012), KAIF and KNS, 2012-05-20

58
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker

Choi, Rakyong; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06

59
Comparison of Anonymous Authentication Protocols

Kim, J; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.369 - 372, 한국정보보호학회, 2002-11-16

60
Computing with secrets for mobile agent using one-time proxy signature

Kim, H.; Baek, J.; Lee, B.; Kim, Kwangjo, SCIS2001, pp.845 - 850, 2001-01

61
Copyright Protection of Software using Public Key Infrastructure

Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, 1999-01

62
Cryptanalysis of ID-Based Remote Authentication with Smart Cards on Open Distributed System from Elliptic Curve Cryptography

Vo, DL; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23

63
Cryptanalysis of Kim et al's Traitor tracing scheme on ACISP02

Zhang, F; Kwangjo Kim, 2002년도 한국정보보호학회 학술대회, pp.99 - 101, Korea Institute of Information Security & Cryptology, 2002-11-16

64
Crypto API 연구 동향

김광조, 제6회 개방형 시스템 및 솔루션 전시회, v.0, no.0, pp.0 - 0, 1998-07-10

65
Deep Learning in Intrusion Detection System: An Overview

Aminanto, Erza; Kim, Kwangjo, 2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, Higher Education Forum, 2016-06

66
DES can be Immune to Linear Cryptanalysis

Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994

67
Design and Implementation of Internet Voting System to the Worldwide level

Kim, Kwangjo, WOTE2001, pp.0 - 0, 2001-08-28

68
Design and Implementation of Secure Tapping Alert Protocol

Kim, Kwangjo; Ahn, G, WISA2001, pp.103 - 121, WISA, 2001-09-01

69
Design of an RFID-embedded e-ID System for Privacy Protection

Ji, S; Kim, Z; Kim, Kwangjo, Proceedings of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01

70
Design of Intrusion Detection System Preventing Insider Attack

Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24

71
Design of secure VoIP using ID-Based Cryptosystem

Han, K; Yeun, C; Kim, K, Proc. Of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01

72
Design of Threshold Blind Signature Scheme

Vo, DL; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.37 - 42, 한국정보보호학회, 2003-07-04

73
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags

Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20

74
Efficient Forward Secure Signature from Bilinear Pairings

Vo, DL; Kim, Kwangjo, 2005년 한국정보보호학회 동계정보보호학술대회, pp.32 - 38, Korea Institute of Information Security & Cryptology, 2005-12-03

75
Efficient Offline Path Validation

Lee, B; Kim, Kwangjo; Seo, M; Huh, W, IWAP2001, pp.117 - 125, 2001-10

76
Electronic Cash System Based on Group Signatures with Revokable Anonymity

Choi, H; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.29 - 34, 한국정보보호학회영남지부, 2003-02-21

77
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher

Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

78
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning

Duc, DN; Park, J; Lee, H; Kim, Kwangjo, SCIS 2006, pp.97 - 97, Institute of Electronics, Information and Communication Engineers, 2006-01

79
EPON의 보안요구사항과 QoSS의 적용

Park, JH; Kim, Kwangjo; Ryu, T; Han, K, 2003년도 한국정보보호학회 충청지부학술대회, pp.251 - 259, 한국정보보호학회, 2003-08-22

80
Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks

Kim, Kyung Min; Hong, Jina; Kim, Kwangjo; Yoo, Paul, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20

81
Evaluation of public datasets for intrusion detection/prevention system benchmark

Huseynov, Khalid; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

82
Experimental Design of Worldwide Internet Voting System using PKI

Kim, Kwangjo; Kim, J; Lee, B; Ahn, G, SSGRR2001, pp.0 - 0, SSGRR, 2001-08

83
Exploring Signature Schemes with Subliminal Channel

Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01

84
Extension of Votopia to Mobile Voting

Lee, H; Vo, DL; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.225 - 229, 한국정보보호학회, 2002-11-16

85
Fair Exchange of Digital Signatures Using Conditional Signature

Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security 2002, pp.179 - 184, Institute of Electronics, Information and Communication Engineers, 2002-01

86
Fair Tracing based on VSS and Blind Signauture without Trustees

Kim, BG; Min, S; Kim, Kwangjo, CSS 2003, pp.37 - 42, CSS, 2003-10-29

87
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04

88
Generic on-line/off-line aggregate signatures

Wu, C.; Xing, Y.; Chen, X.; Long, D.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.107 - 112, IEEE, 2008-07-29

89
Generic security-amplifying methods of ordinary digital signatures

Li, J.; Kim, Kwangjo; Zhang, F.; Wong, D.S., 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, pp.224 - 241, Springer Verlag (Germany), 2008-06-03

90
Group Mutual Exlusion based Secure Distributed Protocol

Park, J; Gang, S; Kim, Kwangjo, CSS2003, pp.445 - 450, 2003-10

91
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05

92
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

93
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

94
Human Authentication Protocol for Distributed Computing Environment

Duc, DN; Kim, Kwangjo, WISA 2006, pp.367 - 372, WISA, 2006-08

95
Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks

Yoon, S; Asano, T; Kusakawa, M; Lee, H; Kim, Kwangjo, Proceedings of SCIS, Institute of Electronics, Information and Communication Engineers, 2008-01

96
ICAO 규격 전자여권의 보안 문제 조사 분석

지성배; 김광조, CISC-W'07 , pp.449 - 452, Korea Institute of Information Security and Cryptology, 2007-12-01

97
ICU 정보보호 석/박사 과정을 위한 교과과정 연구

천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28

98
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현

한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01

99
ID-Based Distributed 'Magic Ink' Signature

Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21

100
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings

Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22

101
Identity-based secret signature scheme

LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24

102
(Im)Possibility of Denial-of-Service Attacks on Network Layer in Wireless Mesh Networks

유명한; 김광조, CISC-W'09, pp.77 - 81, 2009-12-05

103
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20

104
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004

Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01

105
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

106
Intrusion-Resilient Key-Evolving Schnorr Signature

Kim, Kwangjo; Kim, J, CSS2003, pp.379 - 384, 2003-10

107
IPsec용 차세대 키관리 프로토콜의 동향 및 분석

김진; 이상원; 최철준; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.272 - 275, 한국정보보호학회, 2003-07-04

108
Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity

Kim, Z.; Kim, J.-S.; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, pp.1 - 5, Institute of Electronics, Information and Communication Engineers, 2007-01-23

109
Large-Scale Network Intrusion Detection

Al-Jarrah, O. Y.; Yoo, P. D.; Kim, Kwangjo, UAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, Khalifa University, 2014-05-13

110
Lattice-based Multi-signature with Linear Homomorphism

Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19

111
Lattice-based Threshold Signature with Message Block Sharing

Choi, Rakyong; Kim, Kwangjo, SCIS2014, v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-22

112
Light-weight RFID Tag-Reader Mutual Authentication Scheme

Konidala, D.M.; Kim, Kwangjo, 한국정보보호학회 학술발표회, pp.179 - 194, Korea Institute of Information Security & Cryptology, 2006-09

113
Limited verifier signature scheme from bilinear pairings

Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06

114
Mobile RFID Security Issues

Konidala, D.M.; Kim, Kwangjo, SCIS 2006, pp.166 - 166, Institute of Electronics, Information and Communication Engineers, 2006-01

115
Multi-Certification Signatures and Their Applications to Public Key Infrastructure

Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01

Discover

rss_1.0 rss_2.0 atom_1.0