Showing results 1 to 9 of 9
A New Transitive Signature Scheme based on RSA-based Security Assumptions Duc, D.N.; Han, K; Kim, Z; Kim, Kwangjo, ACNS2005, pp.165 - 175, ACNS, 2005-06-07 |
A Secure Testament Revealing Protocol Han, K; Zhang, F; Kim, J; Kim, Kwangjo, SCIS2003, pp.399 - 404, SCIS, 2003-01 |
Design of Intrusion Detection System Preventing Insider Attack Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24 |
Design of secure VoIP using ID-Based Cryptosystem Han, K; Yeun, C; Kim, K, Proc. Of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 |
EPON의 보안요구사항과 QoSS의 적용 Park, JH; Kim, Kwangjo; Ryu, T; Han, K, 2003년도 한국정보보호학회 충청지부학술대회, pp.251 - 259, 한국정보보호학회, 2003-08-22 |
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004 Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01 |
New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP Han, K; Yoon, C; Kim, K, Triangle Symposium on Advanced ICT 2008, TriSAI, 2008-10-06 |
New Key Escrow Model for the Lawful Interception in 3GPP Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12 |
Yet Another Intrusion Detection System against Insider Attacks Kim, Kwangjo; Mun, H; Han, K; Yeun, CY, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Discover