10 results on '"Choo, Kim-Kwang Raymond"'
Search Results
2. A secure and efficient public auditing scheme using RSA algorithm for cloud storage
3. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
4. A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.
5. White-Box Implementation of Shamir’s Identity-Based Signature Scheme.
6. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
7. On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
8. Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
9. An Integrative Framework to Protocol Analysis and Repair: Bellare–Rogaway Model + Planning + Model Checker.
10. On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.