Search results for: Joong Lee
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’94 > Implementation and Hardware Aspects > 95-107
Lecture Notes in Computer Science > Information Security Applications > Public Key Schemes I > 73-86
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 471-480
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 121-136
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 442-450
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Digital Signature > 53-68
Lecture Notes in Computer Science > Computer Network Security > Public Key Distribution, Authentication, Access Control > 229-240
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Symmetric Cryptography > 382-396
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Smartcards and Embedded Systems > 73-79
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Effciency Improvements > 325-339