Results 41-50 of 187 (Search time: 0.006 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Ring Authenticated Encryption: A New Type of Authenticated Encryption Lv, J; Ren, K; Chen, X; Kim, Kwangjo, SCIS04, pp.1179 - 1184, 2004-01 | |
Limited verifier signature scheme from bilinear pairings Xiaofeng Chen; Fangguo Zhang; Kim, Kwangjo, ACNS04, pp.350 - 363, Springer-Verlag, 2004-06 | |
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10 | |
Reconsidering Ryu-Takagi RFID authentication protocol Duc, D.N.; Kim, Kwangjo; Yeun, C.Y., 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, ICITST 2010, 2010-11-08 | |
Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control Konidala, Divyan M.; Dwijaksara, Made H; Kim, Kwangjo; Lee, Dongman; Lee, Byoungcheon; Kim, Daeyoung; Kim, Soontae, International Workshop on Smartphone Applications and Services, 2010-12-09 | |
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템 홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03 | |
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker Choi, Rakyong; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06 | |
Privacy Challenges in Online Social Network Lin, Jia-Hua; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06 | |
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 | |
Evaluation of public datasets for intrusion detection/prevention system benchmark Huseynov, Khalid; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 |
Discover