Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 21-30 of 88 (Search time: 0.01 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
21
Efficient Public Auction with One-Time Registration and Public Verifiability

Byoungcheon Lee; Kim, Kwangjo; Ma, JoongSoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2247, no.0, pp.162 - 174, 2001-12

22
Providing receipt-freeness in mixnet-based voting protocols

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258, 2004

23
An efficient tree-based group key agreement using bilinear map

Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2846, pp.357 - 371, 2003

24
Highly reliable trust establishment scheme in ad hoc networks

Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08

25
Receipt-free electronic voting scheme with a tamper-resistant randomizer

Lee, Byoungcheon; Kim, Kwangjo, IFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2587, pp.389 - 406, 2002

26
ID-based, blind signature and ring signature from pairings

Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002

27
Design and implementation of an efficient fair off-line E-cash system based on elliptic curve discrete logarithm problem

Lee, Manho; Ahn, Gookwhan; KIm Jinho; Park, Jaekwan; Lee, Byouncheon; Kim, Kwangjo; Lee, Hyukjae, JOURNAL OF COMMUNICATIONS AND NETWORKS, v.4, no.2, pp.81 - 89, 2002-06

28
Efficient and Secure File Deduplication in Cloud Storage

Shin, Youngjoo; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

29
Identity-based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

30
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

Aminanto, Muhamad Erza; Choi, Rakyong; Tanuwidjaja, Harry Chandra; Yoo, Paul D.; Kim, Kwangjo, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.13, no.3, pp.621 - 636, 2018-03

rss_1.0 rss_2.0 atom_1.0