|
Journal
|
2016 |
Hash Table with Expanded-Key for High-Speed Networking
신선호 IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750 |
1 |
원문
|
|
Conference
|
2015 |
Time Authentication Scheme for Streaming Data
Jho Nam-Su International Conference on Internet (ICONI) 2015, pp.159-161 |
|
|
|
Conference
|
2010 |
Improved Authentication Scheme Using Facial Recognition Scheme Based on RFID Tag
Dae-Hee Seo International Conference on Multimedia Information Networking and Security (MINES) 2010, pp.287-291 |
1 |
원문
|
|
Conference
|
2009 |
Hash Function with Variable Output Length
Ryu Jong Ho International Joint Conference on INC, IMS and IDC NCM (NCM) 2009, pp.600-605 |
1 |
원문
|
|
Conference
|
2008 |
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
Kim Moo Seop World Conference on Information Security Applications (WISA) 2008 (LNCS 5379), v.5379, pp.292-304 |
1 |
원문
|
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|
|
Conference
|
2006 |
Secure Message Delivery Mechanism on Structured Overlay Network
Nah Jae Hoon Joint Workshop on Information Security (JWIS) 2006, pp.1-8 |
|
|
|
Conference
|
2006 |
Low Power Implementation of SHA-1 Algorithm for RFID System
Choi Yong-Je International Symposium on Consumer Electronics (ISCE) 2006, pp.682-686 |
5 |
|