Results 1-7 of 7 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
EPON의 보안요구사항과 QoSS의 적용 Park, JH; Kim, Kwangjo; Ryu, T; Han, K, 2003년도 한국정보보호학회 충청지부학술대회, pp.251 - 259, 한국정보보호학회, 2003-08-22 | |
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004 Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01 | |
A Secure Testament Revealing Protocol Han, K; Zhang, F; Kim, J; Kim, Kwangjo, SCIS2003, pp.399 - 404, SCIS, 2003-01 | |
Design of Intrusion Detection System Preventing Insider Attack Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24 | |
Yet Another Intrusion Detection System against Insider Attacks Kim, Kwangjo; Mun, H; Han, K; Yeun, CY, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01 | |
New Key Escrow Model for the Lawful Interception in 3GPP Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12 | |
A New Transitive Signature Scheme based on RSA-based Security Assumptions Duc, D.N.; Han, K; Kim, Z; Kim, Kwangjo, ACNS2005, pp.165 - 175, ACNS, 2005-06-07 |