Search results for: Joonsang Baek
Wireless Personal Communications > 2017 > 95 > 4 > 5097-5120
IEEE Transactions on Intelligent Transportation Systems > 2017 > 18 > 3 > 690 - 700
IEEE Transactions on Services Computing > 2017 > 10 > 2 > 165 - 175
Lecture Notes in Computer Science > Security and Cryptography for Networks > Session 9: Encryption III > 358-374
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2008 > General Track > 1249-1259
Lecture Notes in Computer Science > Cryptology and Network Security > Public Key Encryption > 194-208
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 49-58
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Public-Key Encryption > 143-155
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Techniques II > 386-397
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2005 > Identity-Based Cryptography > 380-397
Lecture Notes in Computer Science > Information Security and Cryptology > Encryption Schemes > 36-51
Lecture Notes in Computer Science > Secure Mobile Ad-hoc Networks and Sensors > Mobile Ad-Hoc Networks and Sensors > 27-37
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2011 > Public-Key Encryption > 302-318