The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kilsoo Chun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun
    Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:720-725 [Conf]
  2. Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
    Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:1-12 [Conf]
  3. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:381-390 [Conf]
  4. Haeryong Park, Kilsoo Chun, Seungho Ahn
    The Security Requirement for off-line E-cash system based on IC Card. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:260-264 [Conf]
  5. Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, BongNam Noh
    The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2006, pp:55-60 [Conf]
  6. Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won
    Group Key Agreement Protocol Among Mobile Devices in Different Cells. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:1090-1097 [Conf]
  7. Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie
    Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:747-753 [Conf]
  8. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:453-459 [Conf]
  9. Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, Seonhee Yoon
    Differential and linear cryptanalysis for 2-round SPNs. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:87, n:5, pp:277-282 [Journal]
  10. Haeryong Park, Seongan Lim, Ikkwon Yie, Hyun Kim, Kilsoo Chun, Jaeil Lee
    An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:60-68 [Conf]

  11. A Digital Identity Management Service Model. [Citation Graph (, )][DBLP]


  12. A New Anti-phishing Method in OpenID. [Citation Graph (, )][DBLP]


  13. Classification of Privacy Enhancing Technologies on Life-cycle of Information. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002