Subject

Subjects : key exchange

  • Articles (25)
  • Patents (2)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2023 Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm   Kim Juyoung  IEEE Access, v.11, pp.45323-45333 2 원문
Journal 2019 Study on Peak Misdetection Recovery of Key Exchange Protocol using Heartbeat   Kim Juyoung  Journal of Supercomputing, v.75, no.6, pp.3288-3301 6 원문
Conference 2017 Recovery of Peak Misdetection for IPI-based Key Exchange   Kim Juyoung  International Conference on Computer Science and its Applications (CSA) 2017, pp.1-5
Conference 2015 Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology   Lee Sokjoon  International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337
Conference 2015 Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures   Jung Yeon Hwang  International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 4 원문
Conference 2015 Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM   최규영  International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.411-422 8 원문
Journal 2014 Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks   Taek-Young Youn  International Journal of Distributed Sensor Networks, v.2014, pp.1-6 3 원문
Journal 2012 Platform-Independent Security Framework for Application Security on Smartphone Environment   Choi Dae Seon  정보과학회논문지 : 정보통신, v.39, no.1, pp.102-107
Conference 2010 A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)   문혜란  International Conference on Multimedia and Ubiquitous Engineering (MUE) 2010, pp.1-5 0 원문
Conference 2008 How to Integrate Diverse Client Authentication Protocol with Various Authentication Means   Lee Hyung Kyu  International Conference on Security and Management (SAM) 2008, pp.1-5
Journal 2007 Key Agreement for Key Hypergraph   Jeong Ik Rae  Computers & Security, v.26, no.7-8, pp.452-458
Journal 2007 3라운드 스마트카드 기반의 키 교환   권정옥  IEICE Transactions on Communications, v.E90-B, no.11, pp.3255-3258 원문
Conference 2007 Anonymous PKI Framework for Privacy-guaranteed e-Services   Choi Byeong Cheol  International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 1 원문
Journal 2007 Efficient Verifier-based Password-authenticated Key Exchange in the Three-party Setting   권정옥  Computer Standards & Interfaces, v.29, no.5, pp.513-520 33 원문
Journal 2007 Strong Diffie-Hellman-DSA Key Exchange   Jeong Ik Rae  IEEE Communications Letters, v.11, no.5, pp.432-433 20 원문
Conference 2006 A Diffie-Hellman Key Exchange Protocol Without Random Oracles   Jeong Ik Rae  International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.37-54 18 원문
Conference 2006 PAK-based Binding Update Method for Mobile IPv6 route optimization   Yoon Ho Sun  International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-8 4 원문
Conference 2006 Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model   권정옥  International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 9 원문
Conference 2006 EAP Using the Split Password-Based Authenticated Key Agreement   Ryu Jong Ho  International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.364-380 0 원문
Conference 2006 Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks   변진욱  International Conference on Security in Pervasive Computing (SPC) 2006 (LNCS 3934), v.3934, pp.3-17 15 원문
Conference 2006 Implementation of 10 Giga VPN Accelerator Board   Kim Ki Hyun  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1552-1556 0
Conference 2004 The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network   Park So Hee  International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 0 원문
Conference 2004 Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism   Yousung Kang  International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 1 원문
Conference 2003 Return Routability Procedure for MAP in HMIPv6   Lee Jun Seob  한국정보과학회 학술 발표 (봄) 2003, pp.409-411
Conference 2001 Ticket based authentication and payment protocol for mobile telecommunications systems   Byung-Rae Lee  Pacific Rim International Symposium on Dependable Computing (PRDC) 2001, pp.218-221 11 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2016 METHOD AND APPARATUS FOR AUTHENTICATED KEY EXCHANGE USING PASSWORD AND IDENTITY-BASED SIGNATURE UNITED STATES
Registered 2016 패스워드와 ID 기반 서명을 이용한 인증 키 합의 방법 및 장치 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.