|
Search the dblp DataBase
Hyun-Jeong Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
Digital Signature Schemes with Restriction on Signing Capability. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:324-335 [Conf]
- Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:482-496 [Conf]
- Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:245-259 [Conf]
- Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:421-432 [Conf]
- Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park
Efficient Multicast Key Management for Stateless Receivers. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:497-509 [Conf]
- Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee
Efficient and Secure Member Deletion in Group Signature Schemes. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:150-161 [Conf]
- Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee
Efficient Member Revocation in Group Signature Schemes. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:195-205 [Conf]
Search in 0.001secs, Finished in 0.002secs
|