Search results for: Chong Hee Kim
Lecture Notes in Computer Science > Cryptology and Network Security > Wireless and Sensor Network Security I > 119-133
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Broadcast and Multicast > 359-373
Lecture Notes in Computer Science > Information Security Applications > Digital Rights Management > 264-277
Lecture Notes in Computer Science > Information Security and Privacy > Broadcast Encryption and Traitor Tracing > 36-49
Lecture Notes in Computer Science > Information Security Applications > Smart Card and Secure Hardware(2) > 256-265
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Hardware and Cryptography II > 215-228
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Privacy and Digital Rights > 98-115
Lecture Notes in Computer Science > Information and Communications Security > Side Channel Analysis > 97-110
IEEE Transactions on Mobile Computing > 2013 > 12 > 5 > 830 - 839
Information Sciences > 2012 > 199 > Complete > 43-57
The Journal of Systems & Software > 2012 > 85 > 9 > 2096-2103
IEEE Transactions on Wireless Communications > 2011 > 10 > 5 > 1618 - 1626
IEEE Communications Letters > 2011 > 15 > 10 > 1078 - 1080
Information Processing Letters > 2010 > 110 > 20 > 882-886