Results 1-4 of 4 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
The ring authenticated encryption scheme - How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01 | |
Highly reliable trust establishment scheme in ad hoc networks Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08 | |
The ring authenticated encryption scheme – How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009 | |
Efficient authenticated key agreement protocol for dynamic groups Ren, Kui; Lee, Hyunrok; Kim, Kwangjo; Yoo, T, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159, 2005 |
Discover