Results 31-40 of 53 (Search time: 0.006 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Practical convertible authenticated encryption schemes using self-certified public keys Lv, Jiqiang; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.169, pp.1285 - 1297, 2005-10 | |
New ID-based threshold signature scheme from bilinear pairings Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3348, pp.371 - 383, 2004 | |
Secure mobile agent using strong non-designated proxy signature Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07 | |
Cryptanalysis of Lee-Hwang-Lis key authentication scheme Zhang, Fangguo; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.161, pp.101 - 107, 2005-02 | |
Security of a multisignature scheme for specified group of verifiers Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07 | |
An Efficient and Provably Secure Threshold Blind Signature Kim, Jinho; Kim, Kwangjo; Lee, Chulsoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2288, pp.318 - 327, 2002 | |
Efficient Public Auction with One-Time Registration and Public Verifiability Lee, Byoungcheon; Kim, Kwangjo; Ma, Joongsoo, INDOCRYPT, 2001 | |
Efficient authenticated key agreement protocol for dynamic groups Ren, Kui; Lee, Hyunrok; Kim, Kwangjo; Yoo, T, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159, 2005 | |
Practical solution for location privacy in mobile IPv6 Choi, S.; Kim, Kwangjo; Kim, B., INFORMATION SECURITY APPLICATIONS, v.2908, pp.69 - 83, 2003 | |
CONUGA: Constrained user-group assignment Ahn, Gail-Joon; Kim, Kwangjo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.24, no.2, pp.87 - 100, 2001-04 |
Discover