The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jung Yeon Hwang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo
    ID-based Authenticated Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:494-505 [Conf]
  2. Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
    Digital Signature Schemes with Restriction on Signing Capability. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:324-335 [Conf]
  3. Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
    Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:276-292 [Conf]
  4. Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    An Anonymous Asymmetric Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:104-114 [Conf]
  5. Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo
    One-Way Chain Based Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:559-574 [Conf]
  6. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    Efficient ID-based Group Key Agreement with Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:130-144 [Conf]
  7. Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee
    Efficient Password-Based Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:191-199 [Conf]
  8. Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
    Efficient Certificateless Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:443-458 [Conf]
  9. Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:60-82 [Conf]

  10. Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. [Citation Graph (, )][DBLP]


  11. Universal forgery of the identity-based sequential aggregate signature scheme. [Citation Graph (, )][DBLP]


  12. Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. [Citation Graph (, )][DBLP]


  13. Security weakness in an authenticated group key agreement protocol in two rounds. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002