|
Search the dblp DataBase
Jung Yeon Hwang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:494-505 [Conf]
- Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
Digital Signature Schemes with Restriction on Signing Capability. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:324-335 [Conf]
- Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:276-292 [Conf]
- Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee
An Anonymous Asymmetric Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP] EC-Web, 2003, pp:104-114 [Conf]
- Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo
One-Way Chain Based Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:559-574 [Conf]
- Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
Efficient ID-based Group Key Agreement with Bilinear Maps. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:130-144 [Conf]
- Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee
Efficient Password-Based Group Key Exchange. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:191-199 [Conf]
- Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
Efficient Certificateless Signature Schemes. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:443-458 [Conf]
- Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). [Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:60-82 [Conf]
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. [Citation Graph (, )][DBLP]
Universal forgery of the identity-based sequential aggregate signature scheme. [Citation Graph (, )][DBLP]
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. [Citation Graph (, )][DBLP]
Security weakness in an authenticated group key agreement protocol in two rounds. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|