Digital Library
Search: "[ keyword: cryptography ]" (5)
-
Shakhriddin Rustamov, Younho Lee, Vol. 20, No. 3, pp. 25-31, Jun. 2019
10.7472/jksii.2019.20.3.25
Keywords: Efficient Implementation, Lizard, Post-Quantum Cryptography, cryptography, Security -
Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
10.7472/jksii.2013.14.5.11
Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption -
Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
10.7472/jksii.2012.13.2.59
Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing -
4. Study of Document Distribution System Architecture for Digital Secret Document Leakage PreventionCheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution -
Hong Seng-Phil, Kim Jae-Hyoun, Vol. 7, No. 2, pp. 161-0, Apr. 2006
Keywords: authentication, smartcard, cryptography, Biopmetrics
Category Search
Publications
-
Vol. 25, 2024
-
Vol. 24, 2023
-
Vol. 23, 2022
-
Vol. 22, 2021
-
Vol. 21, 2020
-
Vol. 20, 2019
-
Vol. 19, 2018
-
Vol. 18, 2017
-
Vol. 17, 2016
-
Vol. 16, 2015
-
Vol. 15, 2014
-
Vol. 14, 2013
-
Vol. 13, 2012
-
Vol. 12, 2011
-
Vol. 11, 2010
-
Vol. 10, 2009
-
Vol. 9, 2008
-
Vol. 8, 2007
-
Vol. 7, 2006
-
Vol. 6, 2005
-
Vol. 5, 2004
-
Vol. 4, 2003
-
Vol. 3, 2002
-
Vol. 2, 2001
-
Vol. 1, 2000