Showing results 1 to 3 of 3
Generic transformation from weakly to strongly unforgeable signatures Huang Q.; Wong D.S.; Li J.; Zhao Y.-M., JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, v.23, no.2, pp.240 - 252, 2008 |
Knot signature functions are independent Cha, JC; Livingston, C, PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY, v.132, no.9, pp.2809 - 2816, 2004 |
위협인자 및 공격 패턴 기반 HWP 문서형 악성코드 탐지 시그니처 생성 최민지; 정동재; 조호묵; 원유재, 정보과학회논문지, v.50, no.6, pp.451 - 459, 2023-06 |
Discover