Search results for: Sangjae Moon
Lecture Notes in Computer Science > Computational Intelligence and Security > Security Models and Architecture > 488-493
Communications in Computer and Information Science > U- and E-Service, Science and Technology > 123-130
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 6: Anonymity and RFID Privacy > 267-281
Lecture Notes in Computer Science > Secure Mobile Ad-hoc Networks and Sensors > Mobile Ad-Hoc Networks and Sensors > 118-131
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Information Systems and Information Technologies (ISIT) Workshop, Security Session > 150-158
Lecture Notes in Computer Science > Selected Areas in Cryptography > Key Establishment Protocols and Access Control > 205-220
Lecture Notes in Computer Science > Computational Science and Its Applications — ICCSA 2003 > Theme: Information Systems and Technologies Security and Watermarking > 338-347
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Attacks on Public Key Systems > 53-61
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Provable Security and Primitives > 117-128
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 411-424
Lecture Notes in Computer Science > Computational Intelligence and Security > Security Models and Architecture > 356-363
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 517-526
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 513-522
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 154-167