Results 71-80 of 187 (Search time: 0.015 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Revealing the Linkability of Popescue ID-based Group Signature Scheme Choi, H; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.81 - 83, Korea Institute of Information Security & Cryptology, 2002-11-16 | |
A new receipt-free voting scheme based on linkable ring signature for designated verifiers Chen, G.; Wu, C.; Han, W.; Chen, X.; Lee, H.; Kim, Kwangjo, 2008 International Conference on Embedded Software and Systems Symposia, ICESS2008, pp.18 - 23, IEEE, 2008-07-29 | |
An enhanced lightweight authentication protocol for access control in wireless LANs Ren, K.; Lee, H.; Han, K.; Park, J.; Kim, Kwangjo, 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity, v.2, pp.444 - 450, IEEE, 2004-11-16 | |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 | |
Wireless Authentication Protocol Preserving User Anonymity Go, J; Park, J; Kim, Kwangjo, WPMC'01, pp.1153 - 1158, WPMC, 2001-09 | |
Design of an RFID-embedded e-ID System for Privacy Protection Ji, S; Kim, Z; Kim, Kwangjo, Proceedings of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 | |
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning Duc, DN; Park, J; Lee, H; Kim, Kwangjo, SCIS 2006, pp.97 - 97, Institute of Electronics, Information and Communication Engineers, 2006-01 | |
Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices Kim, J; Choi, S; Kim, Kwangjo; Boyd, C, SCIS2003, pp.405 - 410, SCIS, 2003-01 | |
On the Power of Computational Secret Sharing Kim, Kwangjo; Vinod, V.; Narayanan, A; Srinathan, K.; Rangan, C. P., Indocrypt2003, v.2904, no.0, pp.162 - 176, Springer-Verlag, 2003-12 | |
A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment Kim, Jangseong; Kim, Zeen; Kim, Kwangjo, 10th International Conference on Information Security and Cryptology (ICISC 2007), v.4817, pp.37 - 48, Springer Verlag (Germany), 2007-11-29 |
Discover