ID-based blind signature and ring signature from pairings F Zhang, K Kim Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002 | 817 | 2002 |
Strong proxy signature and its applications B Lee, H Kim, K Kim Proceedings of SCIS 2001, 603-608, 2001 | 612 | 2001 |
Efficient ID-based blind signature and proxy signature from bilinear pairings F Zhang, K Kim Information Security and Privacy: 8th Australasian Conference, ACISP 2003 …, 2003 | 416 | 2003 |
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning DN Duc, J Park, H Lee, K Kim SCIS 2006, 97-97, 2006 | 351 | 2006 |
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks Q Wang, H Su, K Ren, K Kim 2011 Proceedings IEEE INFOCOM, 1422-1430, 2011 | 328 | 2011 |
Secure mobile agent using strong non-designated proxy signature B Lee, H Kim, K Kim Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001 | 324 | 2001 |
Deep abstraction and weighted feature selection for Wi-Fi impersonation detection ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017 | 244 | 2017 |
Mutual authentication protocol for low-cost RFID J Yang, J Park, H Lee, K Ren, K Kim Workshop on RFID and lightweight crypto, 17-24, 2005 | 238 | 2005 |
New ID-based group signature from pairings X Chen, F Zhang, K Kim Journal of Electronics (China) 23 (6), 892-900, 2006 | 210 | 2006 |
Providing receipt-freeness in mixnet-based voting protocols B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004 | 198 | 2004 |
A novel privacy preserving authentication and access control scheme for pervasive computing environments K Ren, W Lou, K Kim, R Deng IEEE Transactions on Vehicular technology 55 (4), 1373-1384, 2006 | 197 | 2006 |
Receipt-free electronic voting scheme with a tamper-resistant randomizer B Lee, K Kim Information Security and Cryptology—ICISC 2002: 5th International …, 2003 | 196 | 2003 |
Secure key issuing in ID-based cryptography B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo Proceedings of the second workshop on Australasian information security …, 2004 | 190 | 2004 |
Improved impossible differential cryptanalysis of Rijndael and Crypton JH Cheon, MJ Kim, K Kim, L Jung-Yeun, SW Kang Information Security and Cryptology—ICISC 2001: 4th International …, 2002 | 190 | 2002 |
Hidden attribute-based signatures without anonymity revocation J Li, K Kim Information Sciences 180 (9), 1681-1689, 2010 | 187 | 2010 |
Data randomization and cluster-based partitioning for botnet intrusion detection OY Al-Jarrah, O Alhussein, PD Yoo, S Muhaidat, K Taha, K Kim IEEE transactions on cybernetics 46 (8), 1796-1806, 2015 | 152 | 2015 |
Secret computation with secrets for mobile agent using one-time proxy signature H Kim, J Baek, B Lee, K Kim Cryptography and information security 2001, 845-850, 2001 | 146 | 2001 |
RFID mutual authentication scheme based on synchronized secret information S Lee, T Asano, K Kim SCIS 2006, 98-98, 2006 | 144 | 2006 |
ID-based one round authenticated tripartite key agreement protocol with pairings F Zhang, S Liu, K Kim Cryptology ePrint Archive, 2002 | 130 | 2002 |
A2BE: Accountable attribute-based encryption for abuse free access control J Li, K Ren, K Kim Cryptology ePrint Archive, 2009 | 125 | 2009 |