Conference
|
2018 |
Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones
Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 |
1 |
|
Journal
|
2017 |
Simplified Small Exponent Test for Batch Verification
Jung Yeon Hwang Theoretical Computer Science, v.662, pp.48-58 |
13 |
원문
|
Journal
|
2016 |
Anonymity-Based Authenticated Key Agreement with Full Binding Property
Jung Yeon Hwang Journal of Communications and Networks, v.18, no.2, pp.190-200 |
3 |
원문
|
Journal
|
2015 |
New efficient batch verification for an identity‐based signature scheme
Jung Yeon Hwang Security and Communication Networks, v.8, no.15, pp.2524-2535 |
4 |
원문
|
Journal
|
2015 |
Short Dynamic Group Signature Scheme Supporting Controllable Linkability
Jung Yeon Hwang IEEE Transactions on Information Forensics and Security, v.10, no.6, pp.1109-1124 |
57 |
원문
|
Journal
|
2015 |
Quantum Messages with Signatures Forgeable in Arbitrated Quantum Signature Schemes
김태완 Physica Scripta, v.90, no.2, pp.1-6 |
15 |
원문
|
Journal
|
2015 |
Collusion-Resistant Convertible Ring Signature Schemes
Jung Yeon Hwang Science China - Information Sciences, v.58, no.1, pp.1-16 |
3 |
원문
|
Journal
|
2014 |
An Enhanced (t,n) Threshold Directed Signature Scheme
Jung Yeon Hwang Information Sciences, v.275, pp.284-292 |
11 |
원문
|
Journal
|
2014 |
ID-Based Optimistic Fair Exchange Scheme Based on RSA
Taek-Young Youn ETRI Journal, v.36, no.4, pp.673-681 |
1 |
원문
|
Journal
|
2013 |
Group Signatures with Controllable Linkability for Dynamic Membership
Jung Yeon Hwang Information Sciences, v.222, pp.761-778 |
50 |
원문
|
Journal
|
2012 |
Joint Relay Selection and Resource Allocation for Cooperative OFDMA Network
기주희 KSII Transactions on Internet and Information Systems, v.6, no.10, pp.2692-2707 |
1 |
원문
|
Conference
|
2012 |
Anonymity-Based Authenticated Key Agreement with Full Binding Property
Jung Yeon Hwang International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.177-191 |
9 |
원문
|
Journal
|
2012 |
Efficient Certificateless Proxy Signature Scheme with Provable Security
서승현 Information Sciences, v.188, pp.322-337 |
38 |
원문
|
Journal
|
2012 |
Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
기주희 ETRI Journal, v.34, no.2, pp.235-244 |
17 |
원문
|
Journal
|
2011 |
Security Problem on Arbitrated Quantum Signature Schemes
최정운 Physical Review A : Atomic, Molecular, and Optical Physics, v.84, no.6, pp.1-5 |
90 |
원문
|
Conference
|
2011 |
Privacy-Enhanced Deniable Authentication E-Mail Service
기주희 International Conference on Digital Enterprise and Information Systems (DEIS) 2011 (CCIS 194), v.194, pp.16-29 |
4 |
원문
|
Journal
|
2011 |
A Note on an Identity-Based Ring Signature Scheme with Signer Verifiability
Jung Yeon Hwang Theoretical Computer Science, v.412, no.8-10, pp.796-804 |
6 |
원문
|
Conference
|
2011 |
Short Group Signatures with Controllable Linkability
Jung Yeon Hwang Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec) 2011, pp.44-52 |
38 |
원문
|
Conference
|
2010 |
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)
문혜란 International Conference on Multimedia and Ubiquitous Engineering (MUE) 2010, pp.1-5 |
0 |
원문
|
Journal
|
2009 |
Non-Interactive Identity-based DNF Signature Scheme and Its Extensions
이광수 Bulletin of the Korean Mathematical Society, v.46, no.4, pp.743-769 |
1 |
원문
|
Conference
|
2006 |
A Revised LKK Proxy Blind Signature Scheme
유종호 International Conference on Advanced Communication Technology (ICACT) 2005, pp.123-127 |
2 |
|
Conference
|
2006 |
Identity Based KCDSA Signcryption
Ryu Jong Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.1369-1374 |
4 |
|
Conference
|
2005 |
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 |
|
원문
|
Conference
|
2003 |
Mobile IP and WLAN with AAA Authentication Protocol using Identity-based Cryptography
Lee Byung-Gil International Conference on Telecommunications (ICT) 2003, pp.597-603 |
16 |
원문
|