The following pages link to Kim-Kwang Raymond Choo (Q507651):
Displayed 38 items.
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- Secure key establishment (Q951129) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification (Q1699747) (← links)
- Context-oriented web application protection model (Q1733478) (← links)
- Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks (Q1734754) (← links)
- A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps (Q1737189) (← links)
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud (Q1740079) (← links)
- Game theoretic security of quantum bit commitment (Q2004756) (← links)
- Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving (Q2177693) (← links)
- Jo-DPMF: differentially private matrix factorization learning through joint optimization (Q2200589) (← links)
- Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data (Q2215086) (← links)
- Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases (Q2402349) (← links)
- Secure outsourcing of modular exponentiations under single untrusted programme model (Q2403228) (← links)
- Two-round password-only authenticated key exchange in the three-party setting (Q2406196) (← links)
- Neighbor-considered migration facilitates cooperation in prisoner's dilemma games (Q2423123) (← links)
- Blockchain-based system for secure outsourcing of bilinear pairings (Q2663527) (← links)
- WOTS-S: a quantum secure compact signature scheme for distributed ledger (Q2666865) (← links)
- On Lightweight Security Enforcement in Cyber-Physical Systems (Q2788819) (← links)
- Towards Lightweight Anonymous Entity Authentication for IoT Applications (Q2817466) (← links)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (Q2817477) (← links)
- (Q3431075) (← links)
- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication (Q3503879) (← links)
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension (Q3507875) (← links)
- (Q4639666) (← links)
- CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones (Q5040390) (← links)
- Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks (Q5205022) (← links)
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols (Q5451092) (← links)
- Errors in Computational Complexity Proofs for Protocols (Q5451094) (← links)
- (Q5459552) (← links)
- Information Security and Privacy (Q5473562) (← links)
- Progress in Cryptology – Mycrypt 2005 (Q5491474) (← links)
- Progress in Cryptology – Mycrypt 2005 (Q5491482) (← links)
- Security in Communication Networks (Q5491710) (← links)
- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys (Q5757714) (← links)
- An efficient IoT forensic approach for the evidence acquisition and analysis based on network link (Q5877744) (← links)
- Applied Cryptography and Network Security (Q5899215) (← links)