kwangjo kim
kwangjo kim
Professor, Computer Science Department, KAIST
Correu electrònic verificat a kaist.ac.kr - Pàgina d'inici
Títol
Citada per
Citada per
Any
ID-based blind signature and ring signature from pairings
F Zhang, K Kim
International Conference on the Theory and Application of Cryptology and …, 2002
6572002
Strong proxy signature and its applications
B Lee, H Kim, K Kim
Proceedings of SCIS 2001, 603-608, 2001
5612001
Efficient ID-based blind signature and proxy signature from bilinear pairings
F Zhang, K Kim
Australasian Conference on Information Security and Privacy, 312-323, 2003
3702003
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
DN Duc, J Park, H Lee, K Kim
SCIS 2006, 97-97, 2006
3442006
Secure mobile agent using strong non-designated proxy signature
B Lee, H Kim, K Kim
Australasian Conference on Information Security and Privacy, 474-486, 2001
2952001
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Q Wang, H Su, K Ren, K Kim
2011 Proceedings IEEE INFOCOM, 1422-1430, 2011
2262011
Mutual authentication protocol for low-cost RFID
J Yang, J Park, H Lee, K Ren, K Kim
Workshop on RFID and lightweight crypto, 17-24, 2005
2092005
A novel privacy preserving authentication and access control scheme for pervasive computing environments
K Ren, W Lou, K Kim, R Deng
IEEE Transactions on Vehicular technology 55 (4), 1373-1384, 2006
1792006
A New ID-based Group Signature Scheme from Bilinear Pairings.
X Chen, F Zhang, K Kim
IACR Cryptology ePrint Archive 2003, 116, 2003
1732003
Providing receipt-freeness in mixnet-based voting protocols
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
International Conference on Information Security and Cryptology, 245-258, 2003
1682003
Hidden attribute-based signatures without anonymity revocation
J Li, K Kim
Information Sciences 180 (9), 1681-1689, 2010
1662010
Receipt-free electronic voting scheme with a tamper-resistant randomizer
B Lee, K Kim
International Conference on Information Security and Cryptology, 389-406, 2002
1662002
Improved impossible differential cryptanalysis of Rijndael and Crypton
JH Cheon, MJ Kim, K Kim, L Jung-Yeun, SW Kang
International Conference on Information Security and Cryptology, 39-49, 2001
1622001
Secure key issuing in ID-based cryptography
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
Proceedings of the second workshop on Australasian information security …, 2004
1562004
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1342001
RFID mutual authentication scheme based on synchronized secret information
S Lee, T Asano, K Kim
Symposium on cryptography and information security, 17-20, 2006
1252006
ID-based one round authenticated tripartite key agreement protocol with pairings
F Zhang, S Liu, K Kim
Cryptology ePrint archive, report 2002/122, 2002
1162002
Receipt-free electronic voting through collaboration of voter and honest verifier
BLK Kim
1032000
Attribute-Based Ring Signatures.
J Li, K Kim
IACR Cryptology ePrint Archive 2008, 394, 2008
912008
Securing HB+ against GRS man-in-the-middle attack
DN Duc, K Kim
Proc. Of SCIS 2007, 23-26, 2007
892007
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20