Conference
|
2015 |
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 |
4 |
원문
|
Journal
|
2015 |
New efficient batch verification for an identity‐based signature scheme
Jung Yeon Hwang Security and Communication Networks, v.8, no.15, pp.2524-2535 |
4 |
원문
|
Conference
|
2015 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
최규영 International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.411-422 |
8 |
원문
|
Journal
|
2012 |
Joint Relay Selection and Resource Allocation for Cooperative OFDMA Network
기주희 KSII Transactions on Internet and Information Systems, v.6, no.10, pp.2692-2707 |
1 |
원문
|
Journal
|
2012 |
Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
기주희 ETRI Journal, v.34, no.2, pp.235-244 |
17 |
원문
|
Journal
|
2011 |
A Note on an Identity-Based Ring Signature Scheme with Signer Verifiability
Jung Yeon Hwang Theoretical Computer Science, v.412, no.8-10, pp.796-804 |
6 |
원문
|
Journal
|
2009 |
Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
구우권 Information Processing Letters, v.109, no.23-24, pp.1260-1262 |
11 |
원문
|
Journal
|
2009 |
Non-Interactive Identity-based DNF Signature Scheme and Its Extensions
이광수 Bulletin of the Korean Mathematical Society, v.46, no.4, pp.743-769 |
1 |
원문
|
Conference
|
2008 |
Identity-based Applicatioins Located by Surveillance System
Kim Geonwoo International Conference on Multimedia, Information Technology and its Applications (MITA) 2008, pp.49-52 |
|
|
Journal
|
2008 |
Random Visitor: Defense against Identity Attacks in P2P Networks
Gu Jabeom IEICE Transactions on Information and Systems, v.E91-D, no.4, pp.1058-1073 |
1 |
원문
|
Conference
|
2006 |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
김태현 International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.168-181 |
22 |
원문
|
Conference
|
2006 |
Identity Based KCDSA Signcryption
Ryu Jong Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.1369-1374 |
4 |
|
Conference
|
2003 |
Concatenated Wireless Roaming Security Association and Authentication Protocol using ID-Based Cryptography
Lee Byung-Gil Vehicular Technology Conference (VTC) 2003, pp.1507-1511 |
6 |
|
Conference
|
2003 |
Mobile IP and WLAN with AAA Authentication Protocol using Identity-based Cryptography
Lee Byung-Gil International Conference on Telecommunications (ICT) 2003, pp.597-603 |
16 |
원문
|