Subjects : collusion attacks
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
| Journal | 2015 | Collusion-Resistant Convertible Ring Signature Schemes Jung Yeon Hwang Science China - Information Sciences, v.58, no.1, pp.1-16 | 4 | 원문 |
| Journal | 2009 | Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme 구우권 Information Processing Letters, v.109, no.23-24, pp.1260-1262 | 11 | 원문 |
| Conference | 2007 | Fingerprinting Algorithm for Tracing Colluders Lee Jung Soo International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 | 0 | 원문 |
| Conference | 2004 | Short N-secure fingerprinting code for image Kim Won Gyum International Conference on Image Processing (ICIP) 2004, pp.2167-2170 | 12 | 원문 |
| Status | Year | Patent Name | Country | Family Pat. | KIPRIS |
|---|---|---|---|---|---|
| No search results. | |||||
| Type | Year | Research Project | Primary Investigator | Download |
|---|---|---|---|---|
| No search results. | ||||