Search results for: Kwangjo Kim
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 621 - 636
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Public-Key Protocols > 199-214
IEEE Transactions on Cybernetics > 2016 > 46 > 8 > 1796 - 1806
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > SecUbiq 2006 Workshop > 252-261
Lecture Notes in Computer Science > Information Security Applications > Public Key Schemes II > 144-159
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC’99 > Electronic Cash, Application, Implementation > 269-277
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Public Key Cryptography > 441-455
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2001 > Applications -I > 162-174
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Voting/Auction Protocols > 245-258
Lecture Notes in Computer Science > Progress in Cryptology —INDOCRYPT 2000 > Cryptographic Protocols > 237-249
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 200-215