Browse "CS-Conference Papers(학술회의논문)" by Author Li, J.

Showing results 1 to 7 of 7

1
Aggregate proxy signature and verifiably encrypted proxy signature

Li, J.; Kim, Kwangjo; Zhang, F.; Chen, X., 1st International Conference on Provable Security 2007, ProvSec 2007, pp.208 - 217, Springer Verlag (Germany), 2007-11-01

2
Generic security-amplifying methods of ordinary digital signatures

Li, J.; Kim, Kwangjo; Zhang, F.; Wong, D.S., 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, pp.224 - 241, Springer Verlag (Germany), 2008-06-03

3
Identity-based chameleon hash scheme without key exposure

Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05

4
Identity-based secret signature scheme

LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24

5
Practical threshold signatures without random oracles

Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007

6
Reversible data hiding giving priority to the use of edges and textures

Hu, Y.; Lee, Heung-Kyu; Li, J., 5th International Conference on Visual Information Engineering, VIE 2008, no.543 CP, pp.643 - 647, IEEE, 2008-07-29

7
Reversible data hiding using prediction error values embedding

Hu, Y.; Lee, Heung-Kyu; Li, J.; Chen, K., 6th International Workshop on Digital Watermarking, IWDW 2007, pp.244 - 253, Springer Verlag, 2007-12-03

Discover

rss_1.0 rss_2.0 atom_1.0