Search results for: Pil Joong Lee
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures (I) > 200-211
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 283-291
Lecture Notes in Computer Science > Security Protocols > 131-138
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Internet Communication Security Workshop > 802-811
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Broadcast and Multicast > 359-373
Lecture Notes in Computer Science > Information Security Applications > Digital Rights Management > 264-277
Lecture Notes in Computer Science > Information Security Applications > Applied Cryptography > 474-488
Lecture Notes in Computer Science > Information Security and Privacy > Broadcast Encryption and Traitor Tracing > 36-49
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’94 > Implementation and Hardware Aspects > 95-107
Lecture Notes in Computer Science > Information Security Applications > Public Key Schemes I > 73-86
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 471-480
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 121-136
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 442-450
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Digital Signature > 53-68