Jeong, Ik Hoon
2713  Ergebnisse:
Personensuche X
?
3

Scalable Privacy-Preserving t-Repetition Protocol with Dist..:

CHUN, Ji Young ; HONG, Dowon ; LEE, Dong Hoon.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E95.A (2012)  12 - p. 2451-2460 , 2012
 
?
4

Analysis of Revocable-iff-Linked Ring Signature Scheme:

JEONG, Ik Rae ; KWON, Jeong Ok ; LEE, Dong Hoon
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E92-A (2009)  1 - p. 322-325 , 2009
 
?
5

Collusion Attacks to Tanaka's Corrected ID-Based Non-intera..:

JEONG, Ik Rae ; KWON, Jeong Ok ; LEE, Dong Hoon
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E92-A (2009)  3 - p. 932-934 , 2009
 
?
7

Stronger Chikazawa-Yamagishi ID-Based Key Distribution:

JEONG, Ik Rae ; KWON, Jeong Ok ; LEE, Dong Hoon
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E92-A (2009)  5 - p. 1379-1382 , 2009
 
?
8

Searchable Encryption with Keyword-Recoverability:

JEONG, Ik Rae ; KWON, Jeong Ok ; HONG, Dowon.
IEICE Transactions on Information and Systems.  E92-D (2009)  5 - p. 1200-1203 , 2009
 
?
10

Key agreement for key hypergraph:

Jeong, Ik Rae ; Lee, Dong Hoon
Computers & Security.  26 (2007)  7-8 - p. 452-458 , 2007
 
?
 
?
 
?
 
1-15