Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-5 of 5 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

Han, Kyusuk; Shon, Taeshik; Kim, Kwangjo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.8, pp.2235 - 2238, 2011-08

2
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Han, Kyusuk; Yeun, Chan Yeob; Shon, Taeshik; Park, Jonghyuk; Kim, Kwangjo, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04

3
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks

Han, Kyusuk; Kim, Kwangjo; Choi, Wook; Choi, Hyo Hyun; Seo, Jungtaek; Shon, Taeshik, AD HOC & SENSOR WIRELESS NETWORKS, v.14, no.3-4, pp.251 - 269, 2012-02

4
Threshold password-based authentication using bilinear pairings

Lee, Sangwon; Han, Kyusuk; Kang, Seok-kyu; Kim, Kwangjo; Ine, So Ran, PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3093, pp.350 - 363, 2004

5
Design of Intrusion Detection System Preventing Insider Attack

Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

rss_1.0 rss_2.0 atom_1.0