Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 71-80 of 86 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
71
Receipt-free electronic auction schemes using homomorphic encryption

Chen, Xiaofeng; Lee, Byoungcheon; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.259 - 273, 2004

72
Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, ETRI JOURNAL, v.22, no.4, pp.25 - 31, 2000-12

73
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000

74
Limited verifier signature from bilinear pairings

Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3089, pp.135 - 148, 2004

75
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01

76
Differentially private client-side data deduplication protocol for cloud storage services

Shin, Youngjoo; Kim, Kwangjo, SECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

77
eMotion: An SGX extension for migrating enclaves

Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; Kim, Kwangjo, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

78
Advances in Security Research in the Asiacrypt Region

Phan, Raphael C. W.; Abe, Masayuki; Batten, Lynn; Cheon, Jung Hee; Dawson, E. D.; Galbraith, Steven; Guo, Jian; Hui, Lucas; Kim, Kwangjo; Lai, Xuejia; Lee, Dong Hoon; Matsui, Mitsuru; Matsumoto, Tsutomu; Moriai, Shiho; Phong Nguyen; Pei, Dingyi; Phan, Duong Hieu; Pieprzyk, Josef; Wang, Huaxiong; Wolfe, Hank; Wong, Duncan; Wu, Tzong-Chen; Yang, Bo-Yin; Yiu, Siu-Ming; Yu, Yu; Zhou, Jianying, COMMUNICATIONS OF THE ACM, v.64, no.4, pp.78 - 81, 2020-03

79
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network

Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.7, pp.1433 - 1447, 2020-07

80
Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey

Tanuwidjaja, Harry Chandra; Choi, Rakyong; Baek, Seunggeun; Kim, Kwangjo, IEEE ACCESS, v.8, pp.167425 - 167447, 2020-09

rss_1.0 rss_2.0 atom_1.0