91 | Á¦¸ñ(Title) | A New Construction of Fuzzy Identity Based Signature Scheme | |
---|---|---|---|
ÀúÀÚ(Author) | Chang-Ji Wang | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 07 NO. 01 PP. 0024 ~ 0029 2009. 03 | ||
92 | Á¦¸ñ(Title) | A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption | |
ÀúÀÚ(Author) | Tamer Mohamed Barakat | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 08 NO. 09 PP. 3231 ~ 3249 2014. 09 | ||
93 | Á¦¸ñ(Title) | A New Public Key Encryption Scheme based on Layered Cellular Automata | |
ÀúÀÚ(Author) | Xing Zhang Rongxing Lu Hong Zhang Chungen Xu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 08 NO. 10 PP. 3572 ~ 3590 2014. 10 | ||
94 | Á¦¸ñ(Title) | A Stream Ciphering Method using a Chaotic System | |
ÀúÀÚ(Author) | Hyun-Jun Choi Young-Ho Seo Dong-Wook Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 08 NO. 04 PP. 0433 ~ 0436 2010. 08 | ||
95 | Á¦¸ñ(Title) | A Hybrid Encryption Technique for Digital Holography using DCT and DWT | |
ÀúÀÚ(Author) | Hyun-Jun Choi Young-Ho Seo Dong-Wook Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 03 PP. 0271 ~ 0275 2011. 06 | ||
96 | Á¦¸ñ(Title) | The Scalability and the Strategy for EMR Database Encryption Techniques | |
ÀúÀÚ(Author) | David Shin Tony Sahama Steve (Jung Tae) Kim Ji-hong Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 05 PP. 0577 ~ 0582 2011. 10 | ||
97 | Á¦¸ñ(Title) | ZigBee Security Using Attribute-Based Proxy Re-encryption | |
ÀúÀÚ(Author) | Hwajeong Seo Howon Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 10 NO. 04 PP. 0343 ~ 0348 2012. 12 | ||
98 | Á¦¸ñ(Title) | Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations | |
ÀúÀÚ(Author) | Hwa Jeong Seo Howon Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 10 NO. 01 PP. 0053 ~ 0060 2012. 03 | ||
99 | Á¦¸ñ(Title) | Optical Image Encryption and Decryption Considering Wireless Communication Channels | |
ÀúÀÚ(Author) | Myungjin Cho In-Ho Lee | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 10 NO. 02 PP. 0215 ~ 0222 2014. 06 | ||
100 | Á¦¸ñ(Title) | Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System | |
ÀúÀÚ(Author) | Tzong-Sun Wu Yih-Sen Chen Han-Yu Lin | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 08 NO. 03 PP. 1157 ~ 1177 2014. 03 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.