Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 86 (Search time: 0.003 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Resuscitating privacy-preserving mobile payment with customer in complete control

Konidala, Divyan Munirathnam; Dwijaksara, Made Harta; Kim, Kwangjoresearcher; Lee, DongManresearcher; Lee, Byung Cheon; Kim, Daeyoungresearcher; Kim, Soontaeresearcher, PERSONAL AND UBIQUITOUS COMPUTING, v.16, no.6, pp.643 - 654, 2012-08

2
Generic security-amplifying methods of ordinary digital signatures

Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjoresearcher; Wong, Duncan S., INFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10

3
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

Kim, Myungsun; Kim, Jongseong; Kim, Kwangjoresearcher, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002

4
Self-certified signatures

Lee, Byoungcheon; Kim, Kwangjoresearcher, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2551, pp.199 - 214, 2002-12

5
Correlation immune functions with controllable nonlinearity

Chee, Seongtaek; Lee Sangjin; Kim, Kwangjoresearcher; Kim, Daeho, ETRI JOURNAL, v.19, pp.389 - 401, 1997-12

6
On the Security of RFID Group Scanning Protocols

Dang, DN; Kim, Kwangjoresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.528 - 530, 2010-03

7
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

Han, Kyusuk; Shon, Taeshik; Kim, Kwangjoresearcher, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.8, pp.2235 - 2238, 2011-08

8
Discrete logarithm based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Kim, Kwangjoresearcher, COMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623, 2011-07

9
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Han, Kyusuk; Yeun, Chan Yeob; Shon, Taeshik; Park, Jonghyuk; Kim, Kwangjoresearcher, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04

10
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Han, Kyusuk; Kim, Kwangjoresearcher; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

rss_1.0 rss_2.0 atom_1.0