Kilsoo Chun

According to our database1, Kilsoo Chun authored at least 15 papers between 2003 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement.
IEICE Trans. Commun., 2008

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A New Anti-phishing Method in OpenID.
Proceedings of the Second International Conference on Emerging Security Information, 2008

A Digital Identity Management Service Model.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
Classification of Privacy Enhancing Technologies on Life-cycle of Information.
Proceedings of the First International Conference on Emerging Security Information, 2007

Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

2006
Group Key Agreement Protocol Among Mobile Devices in Different Cells.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

The Security Requirement for off-line E-cash system based on IC Card.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme.
Proceedings of the Computational Science and Its Applications, 2005

2003
Differential and linear cryptanalysis for 2-round SPNs.
Inf. Process. Lett., 2003


  Loading...