|
Search the dblp DataBase
Ik Rae Jeong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
One-Round Protocols for Two-Party Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:220-232 [Conf]
- Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:37-54 [Conf]
- Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
Password-Authenticated Key Exchange between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:134-146 [Conf]
- Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:16-34 [Conf]
- Ik Rae Jeong, Dong Hoon Lee
Anonymity Control in Multi-bank E-Cash System. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:104-116 [Conf]
- Ik Rae Jeong, Dong Hoon Lee, Jong In Lim
Efficient Transferable Cash with Group Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:462-474 [Conf]
- Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:322-336 [Conf]
- Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee
Difference Set Attacks on Conjunctive Keyword Search Schemes. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2006, pp:64-74 [Conf]
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP]
Constructing PEKS schemes secure against keyword guessing attacks is possible? [Citation Graph (, )][DBLP]
Key agreement for key hypergraph. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|