Results 11-13 of 13 (Search time: 0.005 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Secure Approach to Deploy RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12 | |
A Secure RFID Reader Protocol based on SLRRP Lee, H; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23 | |
Aggregate proxy signature and verifiably encrypted proxy signature Li, J.; Kim, Kwangjo; Zhang, F.; Chen, X., 1st International Conference on Provable Security 2007, ProvSec 2007, pp.208 - 217, Springer Verlag (Germany), 2007-11-01 |
Discover