Conference
|
2015 |
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 |
4 |
원문
|
Journal
|
2014 |
An Enhanced (t,n) Threshold Directed Signature Scheme
Jung Yeon Hwang Information Sciences, v.275, pp.284-292 |
11 |
원문
|
Journal
|
2013 |
Group Signatures with Controllable Linkability for Dynamic Membership
Jung Yeon Hwang Information Sciences, v.222, pp.761-778 |
50 |
원문
|
Journal
|
2012 |
Efficient Certificateless Proxy Signature Scheme with Provable Security
서승현 Information Sciences, v.188, pp.322-337 |
38 |
원문
|
Journal
|
2009 |
Non-Interactive Identity-based DNF Signature Scheme and Its Extensions
이광수 Bulletin of the Korean Mathematical Society, v.46, no.4, pp.743-769 |
1 |
원문
|
Journal
|
2008 |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks
서석충 Telecommunications Review, v.18, no.1, pp.112-126 |
|
|
Journal
|
2007 |
Key Agreement for Key Hypergraph
Jeong Ik Rae Computers & Security, v.26, no.7-8, pp.452-458 |
|
|
Conference
|
2007 |
Anonymous PKI Framework for Privacy-guaranteed e-Services
Choi Byeong Cheol International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 |
1 |
원문
|
Journal
|
2007 |
Strong Diffie-Hellman-DSA Key Exchange
Jeong Ik Rae IEEE Communications Letters, v.11, no.5, pp.432-433 |
20 |
원문
|
Conference
|
2006 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles
Jeong Ik Rae International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.37-54 |
18 |
원문
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|
Journal
|
2006 |
ID-based Signcryption with Improved Security
Byeongok Kwak 한국컴퓨터정보학회논문지, v.11, no.2, pp.239-251 |
|
|
Journal
|
2002 |
Implementation of Secure VoIP System based on H.235
임범진 한국통신학회논문지 B : 네트워크 및 융합 서비스, v.27, no.12C, pp.1238-1244 |
|
|
Journal
|
2002 |
Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication
박현미 정보보호학회논문지, v.12, no.3, pp.49-59 |
|
|
Journal
|
1998 |
Key Distribution for Secure VSAT Satellite Communications
Park Jeong-Hyun IEEE Transactions on Broadcasting, v.44, no.3, pp.274-277 |
12 |
원문
|
Journal
|
1996 |
Diffie- Hellman 방법의 위성망에서의 응용
Park Jeong-Hyun 통신정보보호학회논문지, v.6, no.3, pp.23-30 |
|
|