Results 1-10 of 25 (Search time: 0.009 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002 | |
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks Han, Kyusuk; Kim, Kwangjo; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02 | |
신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거 허준범; 이윤호; 윤현수, 정보과학회논문지 : 정보통신, v.35, no.1, pp.76 - 90, 2008-02 | |
Tamper resistant software by integrity-based encryption Lee, J; Kim, H; Yoon, Hyunsoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.608 - 612, 2004 | |
Hippocratic XML databases: a model and an access control mechanism Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, COMPUTER SYSTEMS SCIENCE AND ENGINEERING, v.21, pp.395 - 404, 2006-11 | |
The dynamic predicate: integrating access control with query processing in XML databases Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, VLDB JOURNAL, v.16, pp.371 - 387, 2007-07 | |
Highly reliable trust establishment scheme in ad hoc networks Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08 | |
Secure group communication with low communication complexity Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004 | |
H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor Jin, Seongwook; Ahn, Jeongseob; Seol, Jinho; Cha, Sanghoon; Huh, Jaehyuk; Maeng, Seungryoul, IEEE TRANSACTIONS ON COMPUTERS, v.64, no.10, pp.2833 - 2846, 2015-10 | |
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids Lee, Youn-Ho; Kim, Hee-Youl; Park, Yong-Su; Yoon, Hyun-Soo, INFORMATION SCIENCES, v.178, no.14, pp.2968 - 2982, 2008-07 |
Discover