The following pages link to Dongho Won (Q507653):
Displaying 27 items.
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol (Q621633) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- Enhancement of two-factor authenticated key exchange protocols in public wireless LANs (Q962621) (← links)
- Two-round password-only authenticated key exchange in the three-party setting (Q2406196) (← links)
- Prevention of exponential equivalence in simple password exponential key exchange (SPEKE) (Q2406235) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- (Q2721581) (← links)
- (Q2762909) (← links)
- Security Improvement on a Group Key Exchange Protocol for Mobile Networks (Q3012072) (← links)
- (Q3149199) (← links)
- An Inter-domain Key Agreement Protocol Using Weak Passwords (Q3600130) (← links)
- Two Efficient and Secure Authentication Schemes Using Smart Cards (Q3603103) (← links)
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity (Q3612379) (← links)
- (Q4251028) (← links)
- (Q4373632) (← links)
- (Q4373633) (← links)
- (Q4436651) (← links)
- (Q4452571) (← links)
- (Q4536275) (← links)
- (Q4536639) (← links)
- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) (Q4550260) (← links)
- Efficient Password-Authenticated Key Exchange Based on RSA (Q5385960) (← links)
- Threshold Entrusted Undeniable Signature (Q5450901) (← links)
- Computational Science – ICCS 2005 (Q5709462) (← links)
- Computational Science and Its Applications – ICCSA 2004 (Q5712479) (← links)
- Computational Science and Its Applications – ICCSA 2004 (Q5712522) (← links)