!-->!-->!-->
Contents
Publication
2011
2010
- ÇѱԼ®, "Advanced Security Schemes in Sensor Networks and Mobile Networks", ¹Ú»çÇÐÀ§³í¹®
- Dang Nguyen Duc, "A Study on Cryptographic Protocols for RFID Tags", ¹Ú»çÇÐÀ§³í¹® [¹ßÇ¥ÀÚ·á]
- ½Å½Â¸ñ, "A Study on authentication scheme for channel assignment mechanism in multi-radio multi-channel wireless mesh networks", ¼®»çÇÐÀ§³í¹®
- ÃÖÀÓ¼º, "A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks", ¼®»çÇÐÀ§³í¹®
- À¯¸íÇÑ, "A Study on a Secure Clustering Scheme in Wireless Sensor Network", ¼®»çÇÐÀ§³í¹®
2009
2008
2007
2006
2005
2004
- ÇѱԼ®, "Location Authentication in Ubiquitous Computing Environment", ¼®»çÇÐÀ§³í¹®
- Àåȼ±, "A Study on Securing AES against Differential Power Analysis", ¼®»çÇÐÀ§³í¹®
- ÃÖöÁØ, "A Study on Digital Signature Secure Against Key Exposure", ¼®»çÇÐÀ§³í¹®
- ±èº´°ï, "Design of Fair Tracing E-cash System based on Blind Signature", ¼®»çÇÐÀ§³í¹®
- ÃÖ¼ö±æ, "Design of Efficient Protocol for Location Privacy in Mobile IPv6", ¼®»çÇÐÀ§³í¹®
- ¹ÚÀçÇõ, "A Study on Secure Group Mutual Exclusion Algorithm", ¼®»çÇÐÀ§³í¹®
- Konidala Munirathnam Divyan, "A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment", ¼®»çÇÐÀ§³í¹®
- À̼ۿø, "Threshold Password-Authenticated Key Retrieval Protocol Using Bilinear Pairings", ¼®»çÇÐÀ§³í¹®
- ±èÁø, "Probably-Secure Identification Scheme based on Conjugacy and DDH Problems", ¼®»çÇÐÀ§³í¹®
- ÀÌ»ó¿ø, "A New Group Key Agreement Scheme based on Ternary Tree", ¼®»çÇÐÀ§³í¹®
- ±èÁ߸¸, "Intrusion-Resilient Key-Evolving Protocol under the Discrete Logarithm Problem", ¼®»çÇÐÀ§³í¹®
- ¹Î¼ºÁØ, "A Study on the Security of NTRUSign digital signature scheme", ¼®»çÇÐÀ§³í¹®
2003
- Dang Nguyen Duc, "Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption", ¼®»çÇÐÀ§³í¹®
- Vo Duc Liem, "Provably Secure Threshold Blind Signature Scheme Using Pairings", ¼®»çÇÐÀ§³í¹®
- ÃÖÇü±â, "Design of E-cash System Using Group Signature", ¼®»çÇÐÀ§³í¹®
- Yan Xie, "A study on Fair Electronic Cash System with and without TTP", ¼®»çÇÐÀ§³í¹®
- ÀÌ»ó¿ø, "A New Group Key Agreement Scheme Based on Ternary tree", ¼®»çÇÐÀ§³í¹®
- ±èÁ¾½Â, "Provably Secure Anonymous Authentication Protocol based on Hash Chains", ¼®»çÇÐÀ§³í¹®
- ÇÔ¿ì¼®, "Design of Secure and Efficient E-commerce Protocols Using Cryptographic Primitives", ¼®»çÇÐÀ§³í¹®
- ÀÌÇö·Ï, "A Study on Adaptive Authentication Mechanism for Virtual Community", ¼®»çÇÐÀ§³í¹®
2002
- À̺´Ãµ, "Zero-Knowledge Proofs, Digital Signature Variants, and Their Applications", ¹Ú»çÇÐÀ§³í¹®
- À̸¸È£, "A Study on Micro-payment Systems for Multiple-shopping", ¼®»çÇÐÀ§³í¹®
- ±èÁøÈ£, "Experimental Design of the Internet Voting System using PKI", ¼®»çÇÐÀ§³í¹®
- ¹ÚÀç°ü, "A Study on Certificates in PKI", ¼®»çÇÐÀ§³í¹®
- ±è¸í¼±, "Provably Secure Identification Protocol based on the Bilinear Diffie-Hellman Problem", ¼®»çÇÐÀ§³í¹®
2001
2000
- ¹ÚÇöö, "Visible Watermarking using Verifiable Digital Seal Image", ¼®»çÇÐÀ§³í¹®
- ¼Ûº¸¿¬, "A Study on Key Agreement Protocol based on Diffie-Hellman Problem", ¼®»çÇÐÀ§³í¹®
- ±èÈñ¼±, "Improving Security and Efficiency of Electronic Cash and Mobile Agent Applicable to Electronic Commerce", ¼®»çÇÐÀ§³í¹®
- °íÀç½Â, "Wireless authentication Protocols Assuring U ser Anonymity and End-to-End Confidentiality", ¼®»çÇÐÀ§³í¹®
- ¹éÁØ»ó, "A study on provable security of public-key encryption schemes and key agreement protocols", ¼®»çÇÐÀ§³í¹®
1999