Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 25 (Search time: 0.009 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002

2
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Han, Kyusuk; Kim, Kwangjo; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

3
신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거

허준범; 이윤호; 윤현수, 정보과학회논문지 : 정보통신, v.35, no.1, pp.76 - 90, 2008-02

4
Tamper resistant software by integrity-based encryption

Lee, J; Kim, H; Yoon, Hyunsoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.608 - 612, 2004

5
Hippocratic XML databases: a model and an access control mechanism

Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, COMPUTER SYSTEMS SCIENCE AND ENGINEERING, v.21, pp.395 - 404, 2006-11

6
The dynamic predicate: integrating access control with query processing in XML databases

Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, VLDB JOURNAL, v.16, pp.371 - 387, 2007-07

7
Highly reliable trust establishment scheme in ad hoc networks

Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08

8
Secure group communication with low communication complexity

Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004

9
H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor

Jin, Seongwook; Ahn, Jeongseob; Seol, Jinho; Cha, Sanghoon; Huh, Jaehyuk; Maeng, Seungryoul, IEEE TRANSACTIONS ON COMPUTERS, v.64, no.10, pp.2833 - 2846, 2015-10

10
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids

Lee, Youn-Ho; Kim, Hee-Youl; Park, Yong-Su; Yoon, Hyun-Soo, INFORMATION SCIENCES, v.178, no.14, pp.2968 - 2982, 2008-07

rss_1.0 rss_2.0 atom_1.0