2011 |
³í¹® |
A secure broadcasting cryptosystem and its application to grid computing |
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS |
2011 |
³í¹® |
Cryptanalysis of a simple three-party password-based key exchange protocol |
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS |
2011 |
³í¹® |
Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem |
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES |
2011 |
³í¹® |
An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map |
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION |
2011 |
³í¹® |
Robust biometric-based three-party authenticated key establishment protocols |
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS |
2010 |
³í¹® |
A Robust Security Mechanism for Mobile Commerce Transactions |
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS |
2010 |
³í¹® |
An Optimized Gateway-oriented Password-based Authenticated Key Exchange Protocol |
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS |
2010 |
³í¹® |
Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability |
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS |
2010 |
³í¹® |
A Biometric Authenticated Key Agreement Protocol for Secure Token |
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS |
2010 |
³í¹® |
A New Fingerprint Biometric Remote User Authentication Scheme using Chaotic Hash Function on Mobile Devices |
INTELLIGENT AUTOMATION AND SOFT COMPUTING |
2010 |
³í¹® |
An Entire Chaos-based Biometric Remote User Authentication Scheme on Tokens without using Password |
INFORMATICA |
2010 |
³í¹® |
ÀÇ·áÁ¤º¸º¸È£¸¦ À§ÇÑ RFID¸¦ ÀÌ¿ëÇÑ È¯ÀÚ ÀÎÁõ ½Ã½ºÅÛ |
Çѱ¹Åë½ÅÇÐȸ³í¹®Áö |
2010 |
Çмú¹ßÇ¥ |
A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves |
4th International Conference on Network and System Security (NSS 2010) |
2009 |
³í¹® |
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting |
INFORMATICA |
2009 |
³í¹® |
°³¼±ÇÑ ÀÏȸ¼º ³¼ö¸¦ ÀÌ¿ëÇÑ RFID »óÈ£ÀÎÁõ ÇÁ·ÎÅäÄÝ |
Á¤º¸°úÇÐȸ³í¹®Áö : Á¤º¸Åë½Å |
2009 |
³í¹® |
°ø°³ ä³Î ±â¹ÝÀÇ RFID »óÈ£ÀÎÁõ ½Ã½ºÅÛ ¼³°è |
Çѱ¹Åë½ÅÇÐȸ³í¹®Áö |
2009 |
Çмú¹ßÇ¥ |
A New Authentication Scheme for Session Initiation Protocol |
2009 International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009 |
2009 |
Çмú¹ßÇ¥ |
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC |
The 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009) |
2009 |
Çмú¹ßÇ¥ |
Robust Multi-Server Authentication Scheme |
NPC 2009, Sixth IFIP International Conference on Network and Parallel Computing |
2009 |
¼ö»ó |
2009 Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ ¿ì¼ö³í¹®»ó |
Çѱ¹Á¤º¸º¸È£ÇÐȸ |
2008 |
³í¹® |
Improving the novel three-party encrypted key exchange protocol |
COMPUTER STANDARDS & INTERFACES |
2008 |
³í¹® |
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem |
FUNDAMENTA INFORMATICAE |
2008 |
Çмú¹ßÇ¥ |
An Efficient Authentication and Key Agreement Protocol in RFID System |
NPC 2008, IFIP International Conference on Network and Parallel Computing |