Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2010

    The system framework and its application in a mobile rfid service network

    Park, N., Gadh, R., Kim, S-J. & Won, D., 2010 Jan 1, Selected Topics in Communication Networks and Distributed Systems. World Scientific Publishing Co., p. 113-139 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • 2003

    An analysis of proxy signatures: Is a secure channel necessary?

    Lee, J. Y., Cheon, J. H. & Kim, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. (ed.). Springer Verlag, p. 68-79 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2612).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    104 Citations (Scopus)
  • An improvement of VeriSign's key roaming service protocol

    Kim, J., Kwon, H., Park, H., Kim, S. & Won, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cueva Lovelle, J. M., Rodriguez, B. M. G., Labra Gayo, J. E., del Puerto Paule Ruiz, M. & Aguilar, L. J. (eds.). Springer Verlag, p. 281-288 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2722).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    1 Citation (Scopus)
  • Prime Numbers of Diffie-Hellman Groups for IKE-MODP

    Yie, I., Lim, S., Kim, S. & Kim, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 228-234 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Rethinking chosen-ciphertext security under Kerckhoffs' assumption

    Kim, S., Mambo, M. & Zheng, Y., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. (ed.). Springer Verlag, p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2612).

    Research output: Chapter in Book/Report/Conference proceedingChapter