Search results for: Jihye Kim
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2007 > Cryptographic Protocols (II) > 287-308
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 309-326
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Key Management and Secret Sharing > 66-83
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Authentication and Web Security > 325-339
Lecture Notes in Computer Science > Privacy Enhancing Technologies > Ninth Privacy Enhancing Technologies Symposium > 164-184
Lecture Notes in Computer Science > Security in Communication Networks > Public Key Cryptosystems > 193-207
2015 International 3D Systems Integration Conference (3DIC) > TS8.34.1 - TS8.34.5