Subject

Subjects : Public Key

  • Articles (46)
  • Patents (3)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Conference 2023 Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials   Daegeun Yoon  Annual Computer Security Applications Conference (ACSAC) 2023, pp.1-11 0 원문
Journal 2023 Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm   Kim Juyoung  IEEE Access, v.11, pp.45323-45333 2 원문
Journal 2022 A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100   박종연  IEEE Access, v.10, pp.2546-2563 9 원문
Journal 2021 Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes   Yusungjin  IEEE Access, v.9, pp.126186-126197 55 원문
Journal 2020 TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things   조은상  Computer Networks, v.175, pp.1-15 7 원문
Conference 2019 Canary   Shin Yong Yoon  Conference on Information-Centric Networking (ICN) 2019, pp.167-168 1 원문
Journal 2018 Recent Technology Trends of Free-Space Quantum Key Distribution System and Components   Youn Chun Ju  전자통신동향분석, v.33, no.6, pp.94-106 원문
Conference 2018 Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones   Keonwoo Kim  Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 1
Journal 2018 TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking   서석충  Security and Communication Networks, v.2018, pp.1-17 2 원문
Journal 2016 Symmetric Searchable Encryption with Efficient Range Query using Multi-layered Linked Chains   Jho Nam-Su  Journal of Supercomputing, v.72, no.11, pp.4233-4246 12 원문
Journal 2015 Trends in Trustworthy Communication for the Next-Generation   Kim Tae Hwan  전자통신동향분석, v.30, no.4, pp.129-139 원문
Journal 2014 Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems   Lee Seoung Hyeon  Information, v.5, no.4, pp.622-633 11 원문
Journal 2014 An Enhanced (t,n) Threshold Directed Signature Scheme   Jung Yeon Hwang  Information Sciences, v.275, pp.284-292 11 원문
Journal 2013 Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search   Jho Nam-Su  KSII Transactions on Internet and Information Systems, v.7, no.5, pp.1328-1342 10 원문
Journal 2012 Efficient Certificateless Proxy Signature Scheme with Provable Security   서승현  Information Sciences, v.188, pp.322-337 38 원문
Journal 2011 Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure   임형진  IEEE Transactions on Vehicular Technology, v.60, no.7, pp.3408-3423 6 원문
Conference 2009 A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm   박제훈  International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 1 원문
Conference 2009 Protecting IPTV Service Network against Malicious Rendezvous Point   Kwon Hyeok Chan  Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 1 원문
Conference 2009 Information-Revealing with Distributed Escrow Authorities   Ryu Jong Ho  International Joint Conference on INC, IMS and IDC NCM (NCM) 2009, pp.1141-1146 1 원문
Journal 2008 Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks   Choi Dae Seon  IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 1 원문
Journal 2008 A More Compact Representation of XTR Cryptosystem   Masaaki Shirase  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E91-A, no.10, pp.2843-2850 11 원문
Journal 2008 Designing Reliable P2P Transmission Mechanism Against MITM Attack   김상춘  정보보호학회논문지, v.18, no.4, pp.103-109
Conference 2008 A Peer Mutual Authentication Method on Super Peer Based Peer-to-Peer Network   Oh Byeong Thaek  International Symposium on Consumer Electronics (ISCE) 2008, pp.1-4 5 원문
Conference 2007 Anonymous PKI Framework for Privacy-guaranteed e-Services   Choi Byeong Cheol  International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 1 원문
Conference 2007 Designing Reliable P2P File Sharing Application without PKI   김상춘  World Conference on Information Security Applications (WISA) 2007, pp.1-9
Conference 2007 Reliable Public Key Distribution Method for Dynamic Peer to Peer Network   Kwon Hyeok Chan  Joint Workshop on Information Security (JWIS) 2007, pp.1-10
Conference 2007 Public Key Management Framework for Two-tier Super Peer Architecture   Kwon Hyeok Chan  International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 4 원문
Conference 2007 An Efficient Password-Based E-mail Protocol for Encrypted E-mail Transmissions on Mobile Equipment   권정옥  International Conference on Consumer Electronics (ICCE) 2007, pp.1-2 3 원문
Conference 2006 PAK-based Binding Update Method for Mobile IPv6 route optimization   Yoon Ho Sun  International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-8 4 원문
Conference 2006 Efficient Exponentiation in GF(p m ) Using the Frobenius Map   이문규  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.584-593 0 원문
Conference 2006 Hash-based Secure Sensor Network Programming Method without Public Key Cryptography   Lee Sokjoon  Workshop on World-Sensor-Web (WSW) 2006, pp.1-3
Conference 2006 Public Key Watermarking for Reversible Image Authentication   Lee Sang Kwang  International Conference on Image Processing (ICIP) 2006, pp.1409-1412 3 원문
Conference 2006 Grid ID Management based on Distributed Agents using SPML   Kim Seung-Hyun  International Symposium on Consumer Electronics (ISCE) 2006, pp.604-609 0
Conference 2006 A Security Model for Home Networks with Authority Delegation   Hwang Jin Bum  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 6 원문
Conference 2006 Identity Based KCDSA Signcryption   Ryu Jong Ho  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1369-1374 4
Conference 2005 Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key   Kim Youngsoo  International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 원문
Conference 2005 Design of Unified Key Management Model using XKMS   Kim Ju Han  International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 원문
Journal 2004 생체 인식-PKI 연구 동향   Jee Hyung-Keun  주간기술동향, v.1133, pp.16-26
Journal 2004 Design and implementation of a private and public key crypto processor and its application to a security system   Kim Ho Won  IEEE Transactions on Consumer Electronics, v.50, no.1, pp.214-224 48 원문
Conference 2003 Concatenated Wireless Roaming Security Association and Authentication Protocol using ID-Based Cryptography   Lee Byung-Gil  Vehicular Technology Conference (VTC) 2003, pp.1507-1511 6
Conference 2003 Mobile IP and WLAN with AAA Authentication Protocol using Identity-based Cryptography   Lee Byung-Gil  International Conference on Telecommunications (ICT) 2003, pp.597-603 16 원문
Conference 2002 FPGA Implementation of RSA Public-Key Cryptographic Coprocessor for Restricted System   Kim Moo Seop  International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.1554-1557
Journal 2002 Authentication and Key Exchange Protocol for Wireless Internet using Passwords   Nyang Daehun  정보과학회논문지 : 정보통신, v.29, no.3, pp.324-332
Journal 2002 A Scalable Secure Multicast Key Management Structure   Lee Su Young  정보과학회논문지 : 정보통신, v.29, no.2, pp.109-116
Conference 2001 Ticket based authentication and payment protocol for mobile telecommunications systems   Byung-Rae Lee  Pacific Rim International Symposium on Dependable Computing (PRDC) 2001, pp.218-221 11 원문
Journal 2000 Attribute Certification Technology and PMI   Jin Seung Hun  정보보호학회지, v.10, no.4, pp.33-40
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2011 GROUP SIGNATURE SYSTEM AND METHOD PROVIDING CONTROLLABLE LINKABILITY UNITED STATES
Registered 2007 디지털케이블 방송망에서 다운로더블 제한수신시스템을 위한 상호인증 및 키 공유 방법과 장치 KOREA KIPRIS
Registered 2022 인증 기관과 독립적으로 인증서 내의 인증 정보를 관리하기 위한 방법 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.