Search results for: JaeCheol Ha
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 6: Anonymity and RFID Privacy > 267-281
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Information Systems and Information Technologies (ISIT) Workshop, Security Session > 150-158
Lecture Notes in Computer Science > Computational Science and Its Applications — ICCSA 2003 > Theme: Information Systems and Technologies Security and Watermarking > 338-347
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Provable Security and Primitives > 117-128
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 411-424
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 154-167
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Approaches or Methods of Security Engineering Workshop > 245-253
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 417-426
Lecture Notes in Computer Science > High Performance Computing and Communications > Track 10: Reliability, Fault-Tolerance, and Security > 549-554
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Implementation Issues > 183-195
Lecture Notes in Computer Science > Information Security Applications > Smart Cards/Secure Systems > 333-344
Lecture Notes in Computer Science > High Performance Computing and Communications > Track 10: Reliability, Fault-Tolerance, and Security > 541-548