Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-4 of 4 (Search time: 0.003 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
The ring authenticated encryption scheme - How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01

2
Highly reliable trust establishment scheme in ad hoc networks

Ren, Kui; Li, Tieyan; Wan, Zhiguo; Bao, Feng; Deng, Robert; Kim, Kwangjo, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699, 2004-08

3
The ring authenticated encryption scheme – How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009

4
Efficient authenticated key agreement protocol for dynamic groups

Ren, Kui; Lee, Hyunrok; Kim, Kwangjo; Yoo, T, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159, 2005

rss_1.0 rss_2.0 atom_1.0