Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 12 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Identity-based secret signature scheme

LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24

2
Open issues in RFID security

Duc, D.N.; Lee, H.; Konidala, D.M.; Kim, Kwangjo, International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009-11-09

3
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

Duc, DN; Kim, Kwangjo, CISC-W'09, pp.222 - 226, Korea Institute of Information Security & Cryptology, 2009-12-05

4
Design of Intrusion Detection System Preventing Insider Attack

Han, K; Mun, H; Yeun, CY; Kim, Kwangjo, The 10th International Workshop on Information Security Applications(WISA 2009), 2009-08-24

5
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20

6
O-FRAP+: Enhancing Security of a Forward secure RFID Authentication Protocol

Duc, D.N.; Kim, Kwangjo, CISC-S'09, pp.406 - 410, Korea Institute of Information Security & Cryptology, 2009-06-05

7
New Key Escrow Model for the Lawful Interception in 3GPP

Han, K; Yoon, C; Kim, Kwangjo, Digest of Technical Papers International Conference on Consumer Electronics, 2009. ICCE '09., pp.1 - 2, IEEE, 2009-01-12

8
An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks

Yim, J; Choi, I; Kim, Kwangjo, The 10th International Workshop on Information Security Applications (WISA 2009), 2009-08-24

9
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags

Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20

10
A Secure Clustering Scheme over an Energy aware Routing Protocol for Monitoring Critical Conditions

Yoo, M; Kim, J; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01

rss_1.0 rss_2.0 atom_1.0