Search

Your search keyword '"Won, Dongho"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Won, Dongho" Remove constraint Author: "Won, Dongho" Search Limiters Full Text Remove constraint Search Limiters: Full Text Language english Remove constraint Language: english
47 results on '"Won, Dongho"'

Search Results

1. Lightweight Hash-Based Authentication Protocol for Smart Grids.

3. Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts.

4. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.

8. Efficient secure group communications for SCADA

9. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

10. Advanced key-management architecture for secure SCADA communications

11. MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^.

14. DDH-based group key agreement in a mobile environment

15. Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.

16. Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving.

17. Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.

18. An improved anonymous authentication scheme for roaming in ubiquitous networks.

19. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

20. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

21. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

22. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.

23. Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.

24. Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.

25. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

26. Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.

27. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.

28. A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems †.

29. Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication.

30. Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.

31. Password-only authenticated three-party key exchange with provable security in the standard model.

32. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

33. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

34. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

35. An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting

36. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

37. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

38. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

39. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

40. A provably-secure ECC-based authentication scheme for wireless sensor networks.

41. Association rule extraction from XML stream data for wireless sensor networks.

42. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

43. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

44. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

45. Password-only authenticated three-party key exchange with provable security in the standard model.

46. On the security of a simple three-party key exchange protocol without server's public keys.

47. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

Catalog

Books, media, physical & digital resources