The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kim-Kwang Raymond Choo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi
    A user-centric anonymous authorisation framework in e-commerce environment. [Citation Graph (0, 0)][DBLP]
    ICEC, 2004, pp:138-147 [Conf]
  2. Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
    An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:371-382 [Conf]
  3. Kim-Kwang Raymond Choo, Yvonne Hitchcock
    Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:429-442 [Conf]
  4. Qiang Tang, Kim-Kwang Raymond Choo
    Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:162-177 [Conf]
  5. Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo
    Formal analysis of secure contracting protocol for e-tendering. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:155-164 [Conf]
  6. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:585-604 [Conf]
  7. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    Errors in Computational Complexity Proofs for Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:624-643 [Conf]
  8. Kim-Kwang Raymond Choo
    Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:297-308 [Conf]
  9. Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi
    A Secure Anonymous Authorisation Architecture for E-Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:106-111 [Conf]
  10. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf]
  11. Colin Boyd, Kim-Kwang Raymond Choo
    Security of Two-Party Identity-Based Key Agreement. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:229-243 [Conf]
  12. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:116-131 [Conf]
  13. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:351-366 [Conf]
  14. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal]
  15. Sherman S. M. Chow, Kim-Kwang Raymond Choo
    Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:203-220 [Conf]
  16. Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng
    Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:169-177 [Conf]
  17. Kim-Kwang Raymond Choo
    On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:467-480 [Journal]

  18. Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]


  19. Secret Signatures: How to Achieve Business Privacy Efficiently? [Citation Graph (, )][DBLP]


  20. A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. [Citation Graph (, )][DBLP]


  21. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. [Citation Graph (, )][DBLP]


Search in 0.018secs, Finished in 0.020secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002