|
Conference
|
2023 |
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
Daegeun Yoon Annual Computer Security Applications Conference (ACSAC) 2023, pp.1-11 |
1 |
원문
|
|
Journal
|
2020 |
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things
조은상 Computer Networks, v.175, pp.1-15 |
8 |
원문
|
|
Conference
|
2011 |
Fast Polynomial Reconstruction Attack against Fuzzy Fingerprint Vault
Woo Yong Choi International Conference on New Trends in Information Science and Service Science (NISS) 2011, pp.299-302 |
|
|
|
Journal
|
2011 |
Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen KSII Transactions on Internet and Information Systems, v.5, no.9, pp.1684-1697 |
0 |
원문
|
|
Journal
|
2009 |
Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
구우권 Information Processing Letters, v.109, no.23-24, pp.1260-1262 |
11 |
원문
|
|
Conference
|
2007 |
Designing Reliable P2P File Sharing Application without PKI
김상춘 World Conference on Information Security Applications (WISA) 2007, pp.1-9 |
|
|
|
Conference
|
2007 |
Public Key Management Framework for Two-tier Super Peer Architecture
Kwon Hyeok Chan International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 |
4 |
원문
|
|
Conference
|
2006 |
Mutual Authentication using Fuzzy Fingerprint Vault
Moon Dae Sung International Conference on Computational Intelligence and Security (ICCIAS) 2006, pp.878-881 |
1 |
원문
|
|
Conference
|
2006 |
Identity Based KCDSA Signcryption
Ryu Jong Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.1369-1374 |
4 |
|
|
Conference
|
2005 |
Design of Unified Key Management Model using XKMS
Kim Ju Han International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 |
|
원문
|
|
Journal
|
2004 |
Design and implementation of a private and public key crypto processor and its application to a security system
Kim Ho Won IEEE Transactions on Consumer Electronics, v.50, no.1, pp.214-224 |
51 |
원문
|
|
Conference
|
2001 |
Design of key recovery system using multiple agent technology for electronic commerce
Lim Shin Young International Symposium on Industrial Electronics (ISIE) 2001, pp.1351-1356 |
|
원문
|