1 | Á¦¸ñ(Title) | A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks | |
---|---|---|---|
ÀúÀÚ(Author) | Dengyong Zhang Pengjie Wu Feng Li Wenjie Zhu Victor S. Sheng Huimin Ren Suhyun Kim Daehee Seo Imyeong Lee | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 05 PP. 1687 ~ 1707 2022. 05 | ||
2 | Á¦¸ñ(Title) | Analysis of Certificateless Signcryption Schemes and Construction of a Secure and Efficient Pairing-free one based on ECC | |
ÀúÀÚ(Author) | Liling Cao Wancheng Ge | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 09 PP. 4527 ~ 4547 2018. 09 | ||
3 | Á¦¸ñ(Title) | Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements | |
ÀúÀÚ(Author) | Bakhtiar Ali Nida Zamir Soon Xin Ng Muhammad Fasih Uddin Butt | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 04 PP. 1594 ~ 1617 2018. 04 | ||
4 | Á¦¸ñ(Title) | A High-Isolation MIMO Antenna with Dual-Port Structure for 5G Mobile Phones | |
ÀúÀÚ(Author) | Hyung-kyu Yang Won-Woo Lee Byung-Ho Rhee | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 04 PP. 1458 ~ 1470 2018. 04 | ||
5 | Á¦¸ñ(Title) | A High Isolation 4 by 4 MIMO Antenna for LTE Mobile Phones using Coupling Elements | |
ÀúÀÚ(Author) | Won-Woo Lee Hyung-kyu Yang Beakcheol Jang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 12 PP. 5745 ~ 5758 2017. 12 | ||
6 | Á¦¸ñ(Title) | Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint | |
ÀúÀÚ(Author) | Shipra Kumari Hari Om | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 12 PP. 4987 ~ 5014 2015. 12 | ||
7 | Á¦¸ñ(Title) | Design On Secure Messenger Mechanism Using Elliptic Curve Cryptography and IPSec | |
ÀúÀÚ(Author) | Gwang-Mi Choi Su-Young Park Hyeong-Gyun Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 02 NO. 03 PP. 0182 ~ 0186 2004. 09 | ||
8 | Á¦¸ñ(Title) | Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein | |
ÀúÀÚ(Author) | Kashif Latif Arshad Aziz Athar Mahboob | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 06 NO. 09 PP. 2388 ~ 2404 2012. 09 | ||
9 | Á¦¸ñ(Title) | Performance Study of genus 3 Hyperelliptic Curve Cryptosystem | |
ÀúÀÚ(Author) | Daya Gupta Asok De Kakali Chatterjee | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 08 NO. 01 PP. 0145 ~ 0158 2012. 03 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.