Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 61-70 of 86 (Search time: 0.007 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
61
Forward Secure ID-based Group Key Agreement Protocol with Anonymity

Park, Hyewon; Kim, Zeen; Kim, Kwangjo, Third International Conference on Emerging Security Information, Systems and Technologies, pp.274-279, 2009-06-18

62
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks

Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

63
Efficient generic on-line/off-line (threshold) signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo, INFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203, 2008-11

64
Receipt-free Electronic Voting Scheme with A Tamper-Resistant Randomizer

Lee, Byoungcheon; Kim, Kwangjo, ICISC, 2002

65
Security analysis of an ID-based key agreement for peer group communication

Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11

66
A universal forgery on Araki et al.s convertible limited verifier signature scheme

Zhang, Fangguo; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E86A, pp.515 - 516, 2003-02

67
A Scalable and Untraceable Authentication Protocol for RFID

Seo, Youngjoon; Lee, Hyunrok; Kim, Kwangjo, 2011-07-22

68
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

69
Design of Intrusion Detection System Preventing Insider Attack

Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

70
Chameleon hashing without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.87 - 98, 2004

rss_1.0 rss_2.0 atom_1.0