Search results for: Kim-Kwang Raymond Choo
Information Systems Frontiers > 2017 > 19 > 5 > 1029-1038
Soft Computing > 2017 > 21 > 23 > 7053-7065
Soft Computing > 2017 > 21 > 1 > 213-221
IEEE Cloud Computing > 2016 > 3 > 4 > 16 - 22
Journal of Network and Computer Applications > 2016 > 70 > C > 171-182
Pervasive and Mobile Computing > 2016 > 28 > C > 122-134
IEEE Cloud Computing > 2016 > 3 > 3 > 16 - 23
Journal of Network and Computer Applications > 2016 > 67 > C > 147-165
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 30-47
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Management > 162-177
IFIP — The International Federation for Information Processing > Formal Aspects in Security and Trust > 129-144
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Cryptographic Protocols > 116-131
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Provable Security > 624-643
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Key Agreement > 585-604
Lecture Notes in Computer Science > Provable Security > Authentication and Symmetric Encryption (Short Papers) > 169-177
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Invited Talk III > 229-243
Lecture Notes in Computer Science > Security in Communication Networks > Key Distribution and Feedback Shift Registers > 351-366