|
Conference
|
2009 |
Context-Aware Dynamic Security Configuration for Mobile Communication Device
An Gaeil International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 |
3 |
원문
|
|
Journal
|
2007 |
Efficient Verifier-based Password-authenticated Key Exchange in the Three-party Setting
권정옥 Computer Standards & Interfaces, v.29, no.5, pp.513-520 |
33 |
원문
|
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|
|
Conference
|
2006 |
Security Points for BcN Infrastructure
Choi Yangseo International Conference on Advanced Communication Technology (ICACT) 2006, pp.293-297 |
1 |
원문
|
|
Conference
|
2006 |
Topology-Aware Key Management Scheme for Secure Overlay Multicast
Noh Jong-Hyouk International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 |
0 |
원문
|
|
Conference
|
2005 |
Key Management for Secure Overlay Multicast
Noh Jong-Hyouk Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345 |
0 |
원문
|
|
Conference
|
2003 |
MF (Minority First) scheme for defeating distributed denial of service attacks
An Gaeil International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 |
7 |
원문
|