|
Journal
|
2010 |
Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users
Park Jee Hyun IEICE Transactions on Communications, v.E93.B, no.4, pp.862-870 |
0 |
원문
|
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Kwon Hyeok Chan Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
원문
|
|
Conference
|
2009 |
Group Key Agreement Scheme for Single Link Failure in Ad-Hoc Network
황진옥 International Conference on Networks (ICN) 2009, pp.133-137 |
0 |
원문
|
|
Conference
|
2009 |
Hierarchical CRGK for a Large-scale User Group
Park Jee Hyun International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 |
0 |
원문
|
|
Journal
|
2008 |
Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks
Paek Kwangjin Journal of Information Science and Engineering, v.24, no.6, pp.1837-1858 |
|
|
|
Journal
|
2007 |
Key Agreement for Key Hypergraph
Jeong Ik Rae Computers & Security, v.26, no.7-8, pp.452-458 |
|
|
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|
|
Conference
|
2006 |
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks
변진욱 International Conference on Security in Pervasive Computing (SPC) 2006 (LNCS 3934), v.3934, pp.3-17 |
15 |
원문
|
|
Journal
|
2005 |
An Efficient Key Distribution Scheme with Self-Healing Property
Hong Do Won IEEE Communications Letters, v.9, no.8, pp.759-761 |
76 |
원문
|
|
Conference
|
2004 |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism
Yousung Kang International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 |
1 |
원문
|