Privacy-aware role based access control model: Revisited for multi-policy conflict detection Y Kim, E Song 2010 International Conference on Information Science and Applications, 1-7, 2010 | 17 | 2010 |
Preventing Bitcoin Selfish Mining Using Transaction Creation Time YK Jihye Lee 2018 International Conference on Software Security and Assurance (ICSSA), 2018 | 13 | 2018 |
Robust lightweight fingerprint encryption using random block feedback Y Kim, J Yoon, JH Joo, K Yi Electronics letters 50 (4), 267-268, 2014 | 8 | 2014 |
Efficient parallel exponentiation in GF (qn) using normal basis representations MK Lee, Y Kim, K Park, Y Cho Journal of Algorithms 54 (2), 205-221, 2005 | 8 | 2005 |
Modified hierarchical privacy-aware role based access control model S Arora, E Song, Y Kim Proceedings of the 2012 ACM Research in Applied Computation Symposium, 344-347, 2012 | 6 | 2012 |
Safety comparison analysis against known/chosen plaintext attack of RBF (random block feedback) mode to other block cipher modes of operation Y Kim, K Yi The Journal of Korean Institute of Communications and Information Sciences …, 2014 | 3 | 2014 |
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm Y Kim, SY Ohm, K Yi IEICE transactions on information and systems 92 (3), 545-547, 2009 | 3 | 2009 |
The random-block feedback mode for block ciphers Y Kim, Y Cho IEICE transactions on fundamentals of electronics, communications and …, 2000 | 3 | 2000 |
Storage efficient algorithm for hermite normal form using lll GH Cho, HS Lee, S Lim, Y Kim Linear Algebra and its Applications 613, 183-200, 2021 | 2 | 2021 |
Efficient parallel exponentiation in GF(2n) using normal basis representations MK Lee, Y Kim, K Park, Y Cho Proceedings of the thirteenth annual ACM symposium on Parallel algorithms …, 2001 | 2 | 2001 |
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk) Y Kim, H Yun, S Lim 2018 International Conference on Software Security and Assurance (ICSSA), 38-38, 2018 | | 2018 |
블록 암호 연산 모드 RBF (Random Block Feedback) 의 알려진/선택 평문 공격에 대한 안전성 비교 분석 김윤정, 이강 한국통신학회논문지 39 (5), 317-322, 2014 | | 2014 |
웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성 김윤정 정보보증논문지 추가정보 표시 8 (3), 1-8, 2008 | | 2008 |
Aspnes, James, 127 R Beigel, DJ Bernstein, JM Boyer, Y Cho, D Eppstein, F Fich, B Gum, ... Journal of Algorithms 54, 223, 2005 | | 2005 |
Kenneth Weber, Vilmar Trevisan, Luiz Felipe Martins. A modular integer GCD al R Beigel, D Eppstein, MK Lee, Y Kim, K Park, Y Cho, P Šparl, J Žerovnik, ... Journal of Algorithms 54, 126, 2005 | | 2005 |
ISO/IEC 의 IDS 기술 표준 동향 김윤정, 이기한 정보보호학회지 14 (2), 6-11, 2004 | | 2004 |
병렬 지수승에서 라운드 수 축소를 위한 알고리즘 김윤정 정보보호학회논문지 14 (1), 113-119, 2004 | | 2004 |
All-or-nothing encryption^ f\h p/p ^ fx/j, UW Y Kim, Y Cho | | |
ICSSA 2018 YB Choi, I Echizen, A Holzinger, P Kieseberg, DK Kim, DS Kim, JM Kim, ... | | |
Hangul Encryption Algorithm Based on DES YKKPY Cho | | |