Results 1-10 of 12 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Identity-based secret signature scheme LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24 | |
Open issues in RFID security Duc, D.N.; Lee, H.; Konidala, D.M.; Kim, Kwangjo, International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009-11-09 | |
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05 | |
Design of Intrusion Detection System Preventing Insider Attack Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24 | |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20 | |
O-FRAP+: Enhancing Security of a Forward secure RFID Authentication Protocol Duc, D.N.; Kim, Kwangjo, CISC-S'09, pp.406 - 410, Korea Institute of Information Security & Cryptology, 2009-06-05 | |
New Key Escrow Model for the Lawful Interception in 3GPP Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12 | |
An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks Yim, J; Choi, I; Kim, Kwangjo, The 10th International Workshop on Information Security Applications (WISA 2009), 2009-08-24 | |
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20 | |
A Secure Clustering Scheme over an Energy aware Routing Protocol for Monitoring Critical Conditions Yoo, M; Kim, J; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01 |
Discover