Browse "CS-Conference Papers(학술회의논문)" by Author 1505

Showing results 74 to 133 of 247

74
Efficient Forward Secure Signature from Bilinear Pairings

Vo, DL; Kim, Kwangjo, 2005년 한국정보보호학회 동계정보보호학술대회, pp.32 - 38, Korea Institute of Information Security & Cryptology, 2005-12-03

75
Efficient Offline Path Validation

Lee, B; Kim, Kwangjo; Seo, M; Huh, W, IWAP2001, pp.117 - 125, 2001-10

76
Electronic Cash System Based on Group Signatures with Revokable Anonymity

Choi, H; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.29 - 34, 한국정보보호학회영남지부, 2003-02-21

77
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher

Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

78
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning

Duc, DN; Park, J; Lee, H; Kim, Kwangjo, SCIS 2006, pp.97 - 97, Institute of Electronics, Information and Communication Engineers, 2006-01

79
EPON의 보안요구사항과 QoSS의 적용

Park, JH; Kim, Kwangjo; Ryu, T; Han, K, 2003년도 한국정보보호학회 충청지부학술대회, pp.251 - 259, 한국정보보호학회, 2003-08-22

80
Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks

Kim, Kyung Min; Hong, Jina; Kim, Kwangjo; Yoo, Paul, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20

81
Evaluation of public datasets for intrusion detection/prevention system benchmark

Huseynov, Khalid; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

82
Experimental Design of Worldwide Internet Voting System using PKI

Kim, Kwangjo; Kim, J; Lee, B; Ahn, G, SSGRR2001, pp.0 - 0, SSGRR, 2001-08

83
Exploring Signature Schemes with Subliminal Channel

Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01

84
Extension of Votopia to Mobile Voting

Lee, H; Vo, DL; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.225 - 229, 한국정보보호학회, 2002-11-16

85
Fair Exchange of Digital Signatures Using Conditional Signature

Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security 2002, pp.179 - 184, Institute of Electronics, Information and Communication Engineers, 2002-01

86
Fair Tracing based on VSS and Blind Signauture without Trustees

Kim, BG; Min, S; Kim, Kwangjo, CSS 2003, pp.37 - 42, CSS, 2003-10-29

87
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04

88
Generic on-line/off-line aggregate signatures

Wu, C.; Xing, Y.; Chen, X.; Long, D.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.107 - 112, IEEE, 2008-07-29

89
Generic security-amplifying methods of ordinary digital signatures

Li, J.; Kim, Kwangjo; Zhang, F.; Wong, D.S., 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, pp.224 - 241, Springer Verlag (Germany), 2008-06-03

90
Group Mutual Exlusion based Secure Distributed Protocol

Park, J; Gang, S; Kim, Kwangjo, CSS2003, pp.445 - 450, 2003-10

91
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05

92
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

93
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

94
Human Authentication Protocol for Distributed Computing Environment

Duc, DN; Kim, Kwangjo, WISA 2006, pp.367 - 372, WISA, 2006-08

95
Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks

Yoon, S; Asano, T; Kusakawa, M; Lee, H; Kim, Kwangjo, Proceedings of SCIS, Institute of Electronics, Information and Communication Engineers, 2008-01

96
ICAO 규격 전자여권의 보안 문제 조사 분석

지성배; 김광조, CISC-W'07 , pp.449 - 452, Korea Institute of Information Security and Cryptology, 2007-12-01

97
ICU 정보보호 석/박사 과정을 위한 교과과정 연구

천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28

98
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현

한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01

99
ID-Based Distributed 'Magic Ink' Signature

Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21

100
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings

Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22

101
Identity-based secret signature scheme

LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24

102
(Im)Possibility of Denial-of-Service Attacks on Network Layer in Wireless Mesh Networks

유명한; 김광조, CISC-W'09, pp.77 - 81, 2009-12-05

103
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20

104
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004

Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01

105
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

106
Intrusion-Resilient Key-Evolving Schnorr Signature

Kim, Kwangjo; Kim, J, CSS2003, pp.379 - 384, 2003-10

107
IPsec용 차세대 키관리 프로토콜의 동향 및 분석

김진; 이상원; 최철준; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.272 - 275, 한국정보보호학회, 2003-07-04

108
Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity

Kim, Z.; Kim, J.-S.; Kim, Kwangjo, The 2007 Symposium on Cryptography and Information Security, pp.1 - 5, Institute of Electronics, Information and Communication Engineers, 2007-01-23

109
Large-Scale Network Intrusion Detection

Al-Jarrah, O. Y.; Yoo, P. D.; Kim, Kwangjo, UAE Forum on Information and Communication Technology Research (ICTRF) 2014, v.0, Khalifa University, 2014-05-13

110
Lattice-based Multi-signature with Linear Homomorphism

Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19

111
Lattice-based Threshold Signature with Message Block Sharing

Choi, Rakyong; Kim, Kwangjo, SCIS2014, v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-22

112
Light-weight RFID Tag-Reader Mutual Authentication Scheme

Konidala, D.M.; Kim, Kwangjo, 한국정보보호학회 학술발표회, pp.179 - 194, Korea Institute of Information Security & Cryptology, 2006-09

113
Limited verifier signature scheme from bilinear pairings

Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06

114
Mobile RFID Security Issues

Konidala, D.M.; Kim, Kwangjo, SCIS 2006, pp.166 - 166, Institute of Electronics, Information and Communication Engineers, 2006-01

115
Multi-Certification Signatures and Their Applications to Public Key Infrastructure

Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01

116
Mutual Authentication Protocol for Low-cost RFID

Yang, J; Park, J; Lee, H; Ren, K; Kim, Kwangjo, Workshop on RFID and Lightweight Crypto, pp.17 - 24, WRLC, 2005-07

117
Mutually Authenticated Key Exchange Protocol For Computationally Limited Devices

Kim, Z; Kim, K; Kang, Y, Triangle Symposium on Advanced ICT, TriSAI, 2008-10-06

118
New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP

Han, K; Yoon, C; Kim, K, Triangle Symposium on Advanced ICT 2008, TriSAI, 2008-10-06

119
New Key Escrow Model for the Lawful Interception in 3GPP

Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12

120
New Polymorphic Worm Detection based on Instruction Distribution and Signature

Noh, H; Kim, J; Yeun, C; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01-22

121
New Receipt-free Voting Scheme Using Double-trapdoor Commitment

Chen, X; Wu, Q; Zhang, F; Wei, B; Lee, B; Lee, H; Kim, Kwangjo, The 8th International Workshop on Information Security Applications, pp.395-409, pp.395 - 409, WISA, 2007-08-27

122
New Revocable E-cash based on the limited power of TTP

Xie, Y; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.266 - 269, 한국정보보호학회, 2002-11-16

123
No More Panic in Florida : Reality or Dream?

Kim, Kwangjo; Kim, J; Lee, B, Rump Session of Crypto2001, pp.0 - 0, 2001-08

124
O-FRAP+: Enhancing Security of a Forward secure RFID Authentication Protocol

Duc, D.N.; Kim, Kwangjo, CISC-S'09, pp.406 - 410, Korea Institute of Information Security & Cryptology, 2009-06-05

125
On the design of secure DRM in ubiquitous environment

한규석; 이송원; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20

126
On the Power of Computational Secret Sharing

Kim, Kwangjo; Vinod, V.; Narayanan, A; Srinathan, K.; Rangan, C. P., Indocrypt2003, v.2904, no.0, pp.162 - 176, Springer-Verlag, 2003-12

127
On the Security of NTRUSign signature scheme

Kim, Kwangjo; Min, SJ; Yamamoto, G, SCIS04, pp.625 - 630, SCIS, 2004-01

128
On the Security of Zhang-Wu-Wang's Forward-Secure Group Signature Scheme in ICICS'03

Wang, P; Chen, X; Kim, Kwangjo, 2004년도 한국정보보호학회 하계정보보호학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-06

129
Open issues in RFID security

Duc, D.N.; Lee, H.; Konidala, D.M.; Kim, Kwangjo, International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009-11-09

130
Practical threshold signatures without random oracles

Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007

131
Privacy Challenges in Online Social Network

Lin, Jia-Hua; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06

132
Privacy Preserving Mutual Authentication Protocol for Low-cost RFID

양정규; Ren, K; 최수길; 김광조, 2004년도 한국정보보호학회 충청지부학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-10

133
Provably-Secure Identification Scheme based on Braid Group

Kim, Z; Kim, Kwangjo, SCIS04, pp.29 - 34, 2004-01

Discover

rss_1.0 rss_2.0 atom_1.0