Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 41-50 of 187 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
41
Ring Authenticated Encryption: A New Type of Authenticated Encryption

Lv, J; Ren, K; Chen, X; Kim, Kwangjo, SCIS04, pp.1179 - 1184, 2004-01

42
Limited verifier signature scheme from bilinear pairings

Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06

43
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis

Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10

44
Reconsidering Ryu-Takagi RFID authentication protocol

Duc, D.N.; Kim, Kwangjo; Yeun, C.Y., 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, ICITST 2010, 2010-11-08

45
Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control

Konidala, Divyan M.; Dwijaksara, Made H; Kim, Kwangjo; Lee, Dongman; Lee, Byoungcheon; Kim, Daeyoung; Kim, Soontae, International Workshop on Smartphone Applications and Services, 2010-12-09

46
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템

홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03

47
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker

Choi, Rakyong; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06

48
Privacy Challenges in Online Social Network

Lin, Jia-Hua; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06

49
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher

Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

50
Evaluation of public datasets for intrusion detection/prevention system benchmark

Huseynov, Khalid; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27

rss_1.0 rss_2.0 atom_1.0