Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 61-70 of 187 (Search time: 0.013 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
61
A Secure On-line Lottery using Bank as a notary

Ham, W; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.121 - 124, 한국정보보호학회, 2002-11-16

62
On the Security of NTRUSign signature scheme

Kim, Kwangjo; Min, SJ; Yamamoto, G, SCIS04, pp.625 - 630, SCIS, 2004-01

63
Improving Choi et als ID based Authenticated Group Key Agreement Scheme at PKC2004

Park, H; Han, K; Yeun, C; Kim, Kwangjo, The 2008 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01

64
New Polymorphic Worm Detection based on Instruction Distribution and Signature

Noh, H; Kim, J; Yeun, C; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2008-01-22

65
Exploring Signature Schemes with Subliminal Channel

Zhang, F; Lee, B; Kim, Kwangjo, SCIS2003, pp.245 - 250, SCIS, 2003-01

66
A Secure Testament Revealing Protocol

Han, K; Zhang, F; Kim, J; Kim, Kwangjo, SCIS2003, pp.399 - 404, SCIS, 2003-01

67
Yet Another Strong Sealed-Bid Auctions

Ham, W; Kim, Kwangjo; Imai, H, SCIS2003, pp.11 - 16, SCIS, 2003-01

68
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05

69
Trend of Malicious Codes and their Countermeasures

Hwang, K; Baek, J; Kim, Kwangjo; Ahn, C, The 2000 Symposium on Cryptography and Informtaion Security, SCIS, 2000-01-26

70
Threshold Password-Based Authentication Using Bilinear Pairings

Lee, Songwon; Yang, Jeongkyu; Kim, Kwangjo, CSS2003, pp.19-24, 2003-10

rss_1.0 rss_2.0 atom_1.0