201 results on '"Won, Dongho"'
Search Results
2. Lightweight Hash-Based Authentication Protocol for Smart Grids.
3. A three-factor anonymous user authentication scheme for Internet of Things environments
4. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network
5. A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols
6. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
7. Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts.
8. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.
9. A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol
10. Towards trustworthy e-voting using paper receipts
11. Threat modeling of a mobile device management system for secure smart work
12. A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed
13. Absolute configuration-dependent epoxide formation from isoflavan-4-ol stereoisomers by biphenyl dioxygenase of Pseudomonas pseudoalcaligenes strain KF707
14. Location of flavone B-ring controls regioselectivity and stereoselectivity of naphthalene dioxygenase from Pseudomonas sp. strain NCIB 9816-4
15. Efficient secure group communications for SCADA
16. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
17. Advanced key-management architecture for secure SCADA communications
18. MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^.
19. Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
20. Security weakness in a three-party pairing-based protocol for password authenticated key exchange
21. DDH-based group key agreement in a mobile environment
22. Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.
23. Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving.
24. Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
25. An improved anonymous authentication scheme for roaming in ubiquitous networks.
26. An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment.
27. Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment.
28. Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks.
29. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
30. Security enhanced multi-factor biometric authentication scheme using bio-hash function.
31. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.
32. Absolute configuration determination of isoflavan-4-ol stereoisomers
33. Cryptanalysis of biometric-based multi-server authentication scheme using smart card.
34. Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
35. Secure Deletion for Flash-Based Self-Encrypting Drives.
36. Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.
37. Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
38. Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
39. Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks.
40. Improved Remote User Trust Evaluation Scheme to apply to Social Network Services.
41. Security Improvement of Portable Key Management Using a Mobile Phone.
42. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
43. Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
44. Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.
45. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.
46. Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.
47. Absolute configurations of isoflavan-4-ol stereoisomers
48. Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks.
49. Scalable Key Management for Dynamic Group in Multi-cast Communication.
50. Protection Profile for PoS (Point of Sale) System.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.