Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 10 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Strong Proxy Signature and its Applications

Lee, B; Kim, H; Kim, Kwangjo, SCIS2001, pp.603 - 608, 2001-01

2
No More Panic in Florida : Reality or Dream?

Kim, Kwangjo; Kim, J; Lee, B, Rump Session of Crypto2001, pp.0 - 0, 2001-08

3
Efficient Offline Path Validation

Lee, B; Kim, Kwangjo; Seo, M; Huh, W, IWAP2001, pp.117 - 125, 2001-10

4
Exploring Signature Schemes with Subliminal Channel

Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01

5
Multi-Certification Signatures and Their Applications to Public Key Infrastructure

Lee, B; Kim, Kwangjo, IWAP2002, pp.3 - 9, IWAP, 2002-10-01

6
Fair Exchange of Digital Signatures Using Conditional Signature

Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security 2002, pp.179 - 184, Institute of Electronics, Information and Communication Engineers, 2002-01

7
New Receipt-free Voting Scheme Using Double-trapdoor Commitment

Chen, X; Wu, Q; Zhang, F; Wei, B; Lee, B; Lee, H; Kim, Kwangjo, The 8th International Workshop on Information Security Applications, pp.395-409, pp.395 - 409, WISA, 2007-08-27

8
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

9
Experimental Design of Worldwide Internet Voting System using PKI

Kim, Kwangjo; Kim, J; Lee, B; Ahn, G, SSGRR2001, pp.0 - 0, SSGRR, 2001-08

10
Copyright Protection of Software using Public Key Infrastructure

Lee, B; Kim, Kwangjo, Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, 1999-01

rss_1.0 rss_2.0 atom_1.0