BibTeX records: Kwangjo Kim

download as .bib file

@article{DBLP:journals/compsec/ParkPKK19,
  author    = {Jaemin Park and
               Sungjin Park and
               Brent ByungHoon Kang and
               Kwangjo Kim},
  title     = {eMotion: An {SGX} extension for migrating enclaves},
  journal   = {Computers {\&} Security},
  volume    = {80},
  pages     = {173--185},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.cose.2018.09.008},
  doi       = {10.1016/j.cose.2018.09.008},
  timestamp = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/ParkPKK19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeKLK19,
  author    = {Jeeun Lee and
               Sungsook Kim and
               Seunghyun Lee and
               Kwangjo Kim},
  title     = {Post-Quantum Security of {IGE} Mode Encryption in Telegram},
  journal   = {{IEICE} Transactions},
  volume    = {102-A},
  number    = {1},
  pages     = {148--151},
  year      = {2019},
  url       = {https://doi.org/10.1587/transfun.E102.A.148},
  doi       = {10.1587/transfun.E102.A.148},
  timestamp = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/LeeKLK19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/TanuwidjajaCK19,
  author    = {Harry Chandra Tanuwidjaja and
               Rakyong Choi and
               Kwangjo Kim},
  title     = {A Survey on Deep Learning Techniques for Privacy-Preserving},
  booktitle = {Machine Learning for Cyber Security - Second International Conference,
               {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  pages     = {29--46},
  year      = {2019},
  crossref  = {DBLP:conf/ml4cs/2019},
  url       = {https://doi.org/10.1007/978-3-030-30619-9\_4},
  doi       = {10.1007/978-3-030-30619-9\_4},
  timestamp = {Tue, 17 Sep 2019 13:22:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ml4cs/TanuwidjajaCK19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/KimAT18,
  author    = {Kwangjo Kim and
               Muhamad Erza Aminanto and
               Harry Chandra Tanuwidjaja},
  title     = {Network Intrusion Detection using Deep Learning - {A} Feature Learning
               Approach},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-981-13-1444-5},
  doi       = {10.1007/978-981-13-1444-5},
  isbn      = {978-981-13-1443-8},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/KimAT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AminantoCTYK18,
  author    = {Muhamad Erza Aminanto and
               Rakyong Choi and
               Harry Chandra Tanuwidjaja and
               Paul D. Yoo and
               Kwangjo Kim},
  title     = {Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation
               Detection},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {3},
  pages     = {621--636},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2762828},
  doi       = {10.1109/TIFS.2017.2762828},
  timestamp = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/AminantoCTYK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AnCK18,
  author    = {Hyeongcheol An and
               Rakyong Choi and
               Kwangjo Kim},
  title     = {Blockchain-Based Decentralized Key Management System with Quantum
               Resistance},
  booktitle = {Information Security Applications - 19th International Conference,
               {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
               Papers},
  pages     = {229--240},
  year      = {2018},
  crossref  = {DBLP:conf/wisa/2018},
  url       = {https://doi.org/10.1007/978-3-030-17982-3\_18},
  doi       = {10.1007/978-3-030-17982-3\_18},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/AnCK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Kim17,
  author    = {Kwangjo Kim},
  title     = {\emph{Cryptography}: {A} New Open Access Journal},
  journal   = {Cryptography},
  volume    = {1},
  number    = {1},
  pages     = {1},
  year      = {2017},
  url       = {https://doi.org/10.3390/cryptography1010001},
  doi       = {10.3390/cryptography1010001},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cryptography/Kim17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AminantoKKK17,
  author    = {Muhamad Erza Aminanto and
               Hakju Kim and
               Kyung{-}Min Kim and
               Kwangjo Kim},
  title     = {Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm},
  journal   = {{IEICE} Transactions},
  volume    = {100-A},
  number    = {1},
  pages     = {176--183},
  year      = {2017},
  url       = {https://doi.org/10.1587/transfun.E100.A.176},
  doi       = {10.1587/transfun.E100.A.176},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/AminantoKKK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiYYNHKO17,
  author    = {Yukou Kobayashi and
               Naoto Yanai and
               Kazuki Yoneyama and
               Takashi Nishide and
               Goichiro Hanaoka and
               Kwangjo Kim and
               Eiji Okamoto},
  title     = {Provably Secure Gateway Threshold Password-Based Authenticated Key
               Exchange Secure against Undetectable On-Line Dictionary Attack},
  journal   = {{IEICE} Transactions},
  volume    = {100-A},
  number    = {12},
  pages     = {2991--3006},
  year      = {2017},
  url       = {https://doi.org/10.1587/transfun.E100.A.2991},
  doi       = {10.1587/transfun.E100.A.2991},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KobayashiYYNHKO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbis/KimA17,
  author    = {Kwangjo Kim and
               Muhamad Erza Aminanto},
  title     = {Deep learning in intrusion detection perspective: Overview and further
               challenges},
  booktitle = {International Workshop on Big Data and Information Security, {IWBIS}
               2017, Jakarta, Indonesia, September 23-24, 2017},
  pages     = {5--10},
  year      = {2017},
  crossref  = {DBLP:conf/iwbis/2017},
  url       = {https://doi.org/10.1109/IWBIS.2017.8275095},
  doi       = {10.1109/IWBIS.2017.8275095},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwbis/KimA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbis/AminantoTYK17,
  author    = {Muhamad Erza Aminanto and
               Harry Chandra Tanuwidjaja and
               Paul D. Yoo and
               Kwangjo Kim},
  title     = {Wi-Fi intrusion detection using weighted-feature selection for neural
               networks classifier},
  booktitle = {International Workshop on Big Data and Information Security, {IWBIS}
               2017, Jakarta, Indonesia, September 23-24, 2017},
  pages     = {99--104},
  year      = {2017},
  crossref  = {DBLP:conf/iwbis/2017},
  url       = {https://doi.org/10.1109/IWBIS.2017.8275109},
  doi       = {10.1109/IWBIS.2017.8275109},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwbis/AminantoTYK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ParkK17,
  author    = {Jaemin Park and
               Kwangjo Kim},
  title     = {TM-Coin: Trustworthy management of {TCB} measurements in IoT},
  booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications
               Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
               13-17, 2017},
  pages     = {654--659},
  year      = {2017},
  crossref  = {DBLP:conf/percom/2017w},
  url       = {https://doi.org/10.1109/PERCOMW.2017.7917640},
  doi       = {10.1109/PERCOMW.2017.7917640},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/ParkK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK17,
  author    = {Muhamad Erza Aminanto and
               Kwangjo Kim},
  title     = {Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep
               Learning},
  booktitle = {Information Security Applications - 18th International Conference,
               {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
               Papers},
  pages     = {212--223},
  year      = {2017},
  crossref  = {DBLP:conf/wisa/2017},
  url       = {https://doi.org/10.1007/978-3-319-93563-8\_18},
  doi       = {10.1007/978-3-319-93563-8\_18},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/AminantoK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerjpre/LiuK17,
  author    = {Yi Liu and
               Kwangjo Kim},
  title     = {Understanding Web 2.0 service models, applications, reflections, perspectives,
               and beyond},
  journal   = {PeerJ PrePrints},
  volume    = {5},
  pages     = {e2811},
  year      = {2017},
  url       = {https://doi.org/10.7287/peerj.preprints.2811v1},
  doi       = {10.7287/peerj.preprints.2811v1},
  timestamp = {Wed, 15 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/peerjpre/LiuK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/Al-JarrahAYMTK16,
  author    = {Omar Y. Al{-}Jarrah and
               Omar Alhussein and
               Paul D. Yoo and
               Sami Muhaidat and
               Kamal Taha and
               Kwangjo Kim},
  title     = {Data Randomization and Cluster-Based Partitioning for Botnet Intrusion
               Detection},
  journal   = {{IEEE} Trans. Cybernetics},
  volume    = {46},
  number    = {8},
  pages     = {1796--1806},
  year      = {2016},
  url       = {https://doi.org/10.1109/TCYB.2015.2490802},
  doi       = {10.1109/TCYB.2015.2490802},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tcyb/Al-JarrahAYMTK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/KimKK16,
  author    = {Jong Myoung Kim and
               Zae Myung Kim and
               Kwangjo Kim},
  title     = {An approach to spam comment detection through domain-independent features},
  booktitle = {2016 International Conference on Big Data and Smart Computing, BigComp
               2016, Hong Kong, China, January 18-20, 2016},
  pages     = {273--276},
  year      = {2016},
  crossref  = {DBLP:conf/bigcomp/2016},
  url       = {https://doi.org/10.1109/BIGCOMP.2016.7425926},
  doi       = {10.1109/BIGCOMP.2016.7425926},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bigcomp/KimKK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/DoJCK16,
  author    = {Hyo Jin Do and
               Young{-}Seob Jeong and
               Ho{-}Jin Choi and
               Kwangjo Kim},
  title     = {Another dummy generation technique in location-based services},
  booktitle = {2016 International Conference on Big Data and Smart Computing, BigComp
               2016, Hong Kong, China, January 18-20, 2016},
  pages     = {532--538},
  year      = {2016},
  crossref  = {DBLP:conf/bigcomp/2016},
  url       = {https://doi.org/10.1109/BIGCOMP.2016.7425987},
  doi       = {10.1109/BIGCOMP.2016.7425987},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bigcomp/DoJCK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/TsuchidaNOK16,
  author    = {Hikaru Tsuchida and
               Takashi Nishide and
               Eiji Okamoto and
               Kwangjo Kim},
  title     = {Revocable Decentralized Multi-Authority Functional Encryption},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
               on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  pages     = {248--265},
  year      = {2016},
  crossref  = {DBLP:conf/indocrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-49890-4\_14},
  doi       = {10.1007/978-3-319-49890-4\_14},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/TsuchidaNOK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK16,
  author    = {Muhamad Erza Aminanto and
               Kwangjo Kim},
  title     = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning
               Approach},
  booktitle = {Information Security Applications - 17th International Workshop, {WISA}
               2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  pages     = {136--147},
  year      = {2016},
  crossref  = {DBLP:conf/wisa/2016},
  url       = {https://doi.org/10.1007/978-3-319-56549-1\_12},
  doi       = {10.1007/978-3-319-56549-1\_12},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/AminantoK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2015,
  editor    = {Sihan Qing and
               Eiji Okamoto and
               Kwangjo Kim and
               Dongmei Liu},
  title     = {Information and Communications Security - 17th International Conference,
               {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9543},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29814-6},
  doi       = {10.1007/978-3-319-29814-6},
  isbn      = {978-3-319-29813-9},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinK15,
  author    = {Young{-}joo Shin and
               Kwangjo Kim},
  title     = {Differentially private client-side data deduplication protocol for
               cloud storage services},
  journal   = {Security and Communication Networks},
  volume    = {8},
  number    = {12},
  pages     = {2114--2123},
  year      = {2015},
  url       = {https://doi.org/10.1002/sec.1159},
  doi       = {10.1002/sec.1159},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ShinK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK15,
  author    = {Hakju Kim and
               Kwangjo Kim},
  title     = {Preliminary Design of a Novel Lightweight Authenticated Encryption
               Scheme Based on the Sponge Function},
  booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
               Kaohsiung City, Taiwan, May 24-26, 2015},
  pages     = {110--111},
  year      = {2015},
  crossref  = {DBLP:conf/asiajcis/2015},
  url       = {https://doi.org/10.1109/AsiaJCIS.2015.24},
  doi       = {10.1109/AsiaJCIS.2015.24},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiajcis/KimK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author    = {Yukou Kobayashi and
               Naoto Yanai and
               Kazuki Yoneyama and
               Takashi Nishide and
               Goichiro Hanaoka and
               Kwangjo Kim and
               Eiji Okamoto},
  title     = {Gateway Threshold Password-based Authenticated Key Exchange Secure
               against Undetectable On-line Dictionary Attack},
  booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015},
  pages     = {39--52},
  year      = {2015},
  crossref  = {DBLP:conf/secrypt/2015},
  url       = {https://doi.org/10.5220/0005539300390052},
  doi       = {10.5220/0005539300390052},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/KobayashiYYNHKO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinK14a,
  author    = {Young{-}joo Shin and
               Kwangjo Kim},
  title     = {Efficient and Secure File Deduplication in Cloud Storage},
  journal   = {{IEICE} Transactions},
  volume    = {97-D},
  number    = {2},
  pages     = {184--197},
  year      = {2014},
  url       = {https://doi.org/10.1587/transinf.E97.D.184},
  doi       = {10.1587/transinf.E97.D.184},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/ShinK14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/0001ZSTLK14,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Willy Susilo and
               Haibo Tian and
               Jin Li and
               Kwangjo Kim},
  title     = {Identity-based chameleon hashing and signatures without key exposure},
  journal   = {Inf. Sci.},
  volume    = {265},
  pages     = {198--210},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ins.2013.12.020},
  doi       = {10.1016/j.ins.2013.12.020},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/0001ZSTLK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/Al-JarrahSEYMK14,
  author    = {O. Y. Al{-}Jarrah and
               A. Siddiqui and
               M. Elsalamouny and
               Paul D. Yoo and
               Sami Muhaidat and
               Kwangjo Kim},
  title     = {Machine-Learning-Based Feature Selection Techniques for Large-Scale
               Network Intrusion Detection},
  booktitle = {34th International Conference on Distributed Computing Systems Workshops
               {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages     = {177--181},
  year      = {2014},
  crossref  = {DBLP:conf/icdcsw/2014},
  url       = {https://doi.org/10.1109/ICDCSW.2014.14},
  doi       = {10.1109/ICDCSW.2014.14},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/Al-JarrahSEYMK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KimK13,
  author    = {Jangseong Kim and
               Kwangjo Kim},
  title     = {A scalable and robust hierarchical key establishment for mission-critical
               applications over sensor networks},
  journal   = {Telecommunication Systems},
  volume    = {52},
  number    = {2},
  pages     = {1377--1388},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11235-011-9650-x},
  doi       = {10.1007/s11235-011-9650-x},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/telsys/KimK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13,
  author    = {Hiroya Takahashi and
               Kenji Yasunaga and
               Masahiro Mambo and
               Kwangjo Kim and
               Heung Youl Youm},
  title     = {Preventing Abuse of Cookies Stolen by {XSS}},
  booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
               Seoul, Korea, July 25-26, 2013},
  pages     = {85--89},
  year      = {2013},
  crossref  = {DBLP:conf/asiajcis/2013},
  url       = {https://doi.org/10.1109/ASIAJCIS.2013.20},
  doi       = {10.1109/ASIAJCIS.2013.20},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiajcis/TakahashiYMKY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/HanKCCSS12,
  author    = {Kyusuk Han and
               Kwangjo Kim and
               Wook Choi and
               Hyo Hyun Choi and
               Jung{-}Taek Seo and
               Taeshik Shon},
  title     = {Efficient Authenticated Key Agreement Protocols for Dynamic Wireless
               Sensor Networks},
  journal   = {Ad Hoc {\&} Sensor Wireless Networks},
  volume    = {14},
  number    = {3-4},
  pages     = {251--269},
  year      = {2012},
  url       = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-14-number-3-4-2012/ahswn-14-3-4-p-251-269/},
  timestamp = {Thu, 07 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ahswn/HanKCCSS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZCKW12,
  author    = {Jin Li and
               Fangguo Zhang and
               Xiaofeng Chen and
               Kwangjo Kim and
               Duncan S. Wong},
  title     = {Generic security-amplifying methods of ordinary digital signatures},
  journal   = {Inf. Sci.},
  volume    = {201},
  pages     = {128--139},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.ins.2012.03.006},
  doi       = {10.1016/j.ins.2012.03.006},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LiZCKW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/KimKPS12,
  author    = {Jangseong Kim and
               Kwangjo Kim and
               Jong Hyuk Park and
               Taeshik Shon},
  title     = {A scalable and privacy-preserving child-care and safety service in
               a ubiquitous computing environment},
  journal   = {Mathematical and Computer Modelling},
  volume    = {55},
  number    = {1-2},
  pages     = {45--57},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.mcm.2011.01.012},
  doi       = {10.1016/j.mcm.2011.01.012},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mcm/KimKPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KonidalaDKLLKK12,
  author    = {Divyan Munirathnam Konidala and
               Made Harta Dwijaksara and
               Kwangjo Kim and
               Dongman Lee and
               Byoungcheon Lee and
               Daeyoung Kim and
               Soontae Kim},
  title     = {Resuscitating privacy-preserving mobile payment with customer in complete
               control},
  journal   = {Personal and Ubiquitous Computing},
  volume    = {16},
  number    = {6},
  pages     = {643--654},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00779-011-0436-7},
  doi       = {10.1007/s00779-011-0436-7},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/puc/KonidalaDKLLKK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinHK12,
  author    = {Young{-}joo Shin and
               Junbeom Hur and
               Kwangjo Kim},
  title     = {Security weakness in the Proof of Storage with Deduplication},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {554},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/554},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ShinHK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChenZTWK11,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Haibo Tian and
               Baodian Wei and
               Kwangjo Kim},
  title     = {Discrete logarithm based chameleon hashing and signatures without
               key exposure},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {37},
  number    = {4},
  pages     = {614--623},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.compeleceng.2011.03.011},
  doi       = {10.1016/j.compeleceng.2011.03.011},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cee/ChenZTWK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DucK11,
  author    = {Dang Nguyen Duc and
               Kwangjo Kim},
  title     = {Defending {RFID} authentication protocols against DoS attacks},
  journal   = {Computer Communications},
  volume    = {34},
  number    = {3},
  pages     = {384--390},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.comcom.2010.06.014},
  doi       = {10.1016/j.comcom.2010.06.014},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/DucK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimSK11,
  author    = {Jangseong Kim and
               Taeshik Shon and
               Kwangjo Kim},
  title     = {Location-Aware and Privacy-Preserving Approach for Child Safety in
               Ubiquitous Computing Environment},
  journal   = {{IEICE} Transactions},
  volume    = {94-B},
  number    = {3},
  pages     = {686--689},
  year      = {2011},
  url       = {https://doi.org/10.1587/transcom.E94.B.686},
  doi       = {10.1587/transcom.E94.B.686},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KimSK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanKS11,
  author    = {Kyusuk Han and
               Kwangjo Kim and
               Taeshik Shon},
  title     = {Enhancing Credibility of Location Based Service Using Multiple Sensing
               Technologies},
  journal   = {{IEICE} Transactions},
  volume    = {94-D},
  number    = {6},
  pages     = {1181--1184},
  year      = {2011},
  url       = {https://doi.org/10.1587/transinf.E94.D.1181},
  doi       = {10.1587/transinf.E94.D.1181},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/HanKS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanSK11,
  author    = {Kyusuk Han and
               Taeshik Shon and
               Kwangjo Kim},
  title     = {Design and Implementation of One-Way Key Agreement Model for Enhancing
               VoIP Internet Phone Security},
  journal   = {{IEICE} Transactions},
  volume    = {94-B},
  number    = {8},
  pages     = {2235--2238},
  year      = {2011},
  url       = {https://doi.org/10.1587/transcom.E94.B.2235},
  doi       = {10.1587/transcom.E94.B.2235},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/HanSK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/HanKPS11,
  author    = {Kyusuk Han and
               Kwangjo Kim and
               Jong Hyuk Park and
               Taeshik Shon},
  title     = {Efficient sensor node authentication in third generation-wireless
               sensor networks integrated networks},
  journal   = {{IET} Communications},
  volume    = {5},
  number    = {12},
  pages     = {1744--1754},
  year      = {2011},
  url       = {https://doi.org/10.1049/iet-com.2010.0539},
  doi       = {10.1049/iet-com.2010.0539},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iet-com/HanKPS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/HanYSPK11,
  author    = {Kyusuk Han and
               Chan Yeob Yeun and
               Taeshik Shon and
               Jong Hyuk Park and
               Kwangjo Kim},
  title     = {A scalable and efficient key escrow model for lawful interception
               of IDBC-based secure communication},
  journal   = {Int. J. Communication Systems},
  volume    = {24},
  number    = {4},
  pages     = {461--472},
  year      = {2011},
  url       = {https://doi.org/10.1002/dac.1165},
  doi       = {10.1002/dac.1165},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijcomsys/HanYSPK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenWZTWLLK11,
  author    = {Xiaofeng Chen and
               Qianhong Wu and
               Fangguo Zhang and
               Haibo Tian and
               Baodian Wei and
               Byoungcheon Lee and
               Hyunrok Lee and
               Kwangjo Kim},
  title     = {New receipt-free voting scheme using double-trapdoor commitment},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {8},
  pages     = {1493--1502},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2010.12.012},
  doi       = {10.1016/j.ins.2010.12.012},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/ChenWZTWLLK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangSRK11,
  author    = {Qian Wang and
               Hai Su and
               Kui Ren and
               Kwangjo Kim},
  title     = {Fast and scalable secret key generation exploiting channel phase randomness
               in wireless networks},
  booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
               Joint Conference of the {IEEE} Computer and Communications Societies,
               10-15 April 2011, Shanghai, China},
  pages     = {1422--1430},
  year      = {2011},
  crossref  = {DBLP:conf/infocom/2011},
  url       = {https://doi.org/10.1109/INFCOM.2011.5934929},
  doi       = {10.1109/INFCOM.2011.5934929},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/WangSRK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/VoLYK10,
  author    = {Duc{-}Liem Vo and
               Hyunrok Lee and
               Chan Yeob Yeun and
               Kwangjo Kim},
  title     = {Enhancements of authenticated multiple key exchange protocol based
               on bilinear pairings},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {36},
  number    = {1},
  pages     = {155--159},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.compeleceng.2009.08.001},
  doi       = {10.1016/j.compeleceng.2009.08.001},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cee/VoLYK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DucK10,
  author    = {Dang Nguyen Duc and
               Kwangjo Kim},
  title     = {On the Security of {RFID} Group Scanning Protocols},
  journal   = {{IEICE} Transactions},
  volume    = {93-D},
  number    = {3},
  pages     = {528--530},
  year      = {2010},
  url       = {https://doi.org/10.1587/transinf.E93.D.528},
  doi       = {10.1587/transinf.E93.D.528},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/DucK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiK10,
  author    = {Jin Li and
               Kwangjo Kim},
  title     = {Hidden attribute-based signatures without anonymity revocation},
  journal   = {Inf. Sci.},
  volume    = {180},
  number    = {9},
  pages     = {1681--1689},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.ins.2010.01.008},
  doi       = {10.1016/j.ins.2010.01.008},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LiK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HanKS10,
  author    = {Kyusuk Han and
               Kwangjo Kim and
               Taeshik Shon},
  title     = {Untraceable Mobile Node Authentication in {WSN}},
  journal   = {Sensors},
  volume    = {10},
  number    = {5},
  pages     = {4410--4429},
  year      = {2010},
  url       = {https://doi.org/10.3390/s100504410},
  doi       = {10.3390/s100504410},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sensors/HanKS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HanSK10,
  author    = {Kyusuk Han and
               Taeshik Shon and
               Kwangjo Kim},
  title     = {Efficient mobile sensor authentication in smart home and {WPAN}},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {56},
  number    = {2},
  pages     = {591--596},
  year      = {2010},
  url       = {https://doi.org/10.1109/TCE.2010.5505975},
  doi       = {10.1109/TCE.2010.5505975},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tce/HanSK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenZSTLK10,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Willy Susilo and
               Haibo Tian and
               Jin Li and
               Kwangjo Kim},
  title     = {Identity-Based Chameleon Hash Scheme without Key Exposure},
  booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
               2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  pages     = {200--215},
  year      = {2010},
  crossref  = {DBLP:conf/acisp/2010},
  url       = {https://doi.org/10.1007/978-3-642-14081-5\_13},
  doi       = {10.1007/978-3-642-14081-5\_13},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ChenZSTLK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanKKS10,
  author    = {Kyusuk Han and
               Jangseong Kim and
               Kwangjo Kim and
               Taeshik Shon},
  title     = {Efficient sensor node authentication via 3GPP mobile communication
               networks},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {687--689},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {https://doi.org/10.1145/1866307.1866398},
  doi       = {10.1145/1866307.1866398},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/HanKKS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KimBKZ10,
  author    = {Jangseong Kim and
               Joonsang Baek and
               Kwangjo Kim and
               Jianying Zhou},
  title     = {A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous
               Computing Environments},
  booktitle = {Public Key Infrastructures, Services and Applications - 7th European
               Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
               Selected Papers},
  pages     = {45--60},
  year      = {2010},
  crossref  = {DBLP:conf/europki/2010},
  url       = {https://doi.org/10.1007/978-3-642-22633-5\_4},
  doi       = {10.1007/978-3-642-22633-5\_4},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/KimBKZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenZTWMKK10,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Haibo Tian and
               Qianhong Wu and
               Yi Mu and
               Jangseong Kim and
               Kwangjo Kim},
  title     = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting
               Secrecy},
  booktitle = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  pages     = {304--311},
  year      = {2010},
  crossref  = {DBLP:conf/fc/2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3\_23},
  doi       = {10.1007/978-3-642-14577-3\_23},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/ChenZTWMKK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucKY10,
  author    = {Dang Nguyen Duc and
               Kwangjo Kim and
               Chan Yeob Yeun},
  title     = {Reconsidering Ryu-Takagi {RFID} authentication protocol},
  booktitle = {5th International Conference for Internet Technology and Secured Transactions,
               {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages     = {1--6},
  year      = {2010},
  crossref  = {DBLP:conf/icitst/2010},
  url       = {http://ieeexplore.ieee.org/document/5678044/},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/DucKY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LvRCK09,
  author    = {Jiqiang Lv and
               Kui Ren and
               Xiaofeng Chen and
               Kwangjo Kim},
  title     = {The ring authenticated encryption scheme - How to provide a clue wisely},
  journal   = {Inf. Sci.},
  volume    = {179},
  number    = {1-2},
  pages     = {161--168},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.ins.2008.09.014},
  doi       = {10.1016/j.ins.2008.09.014},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LvRCK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ZaidiHKMGK09,
  author    = {Syed Ali Raza Zaidi and
               Maryam Hafeez and
               Syed A. Khayam and
               Desmond C. McLernon and
               Mounir Ghogho and
               Kwangjo Kim},
  title     = {On minimum cost coverage in wireless sensor networks},
  booktitle = {43rd Annual Conference on Information Sciences and Systems, {CISS}
               2009, The John Hopkins University, Baltimore, MD, USA, 18-20 March
               2009},
  pages     = {213--218},
  year      = {2009},
  crossref  = {DBLP:conf/ciss/2009},
  url       = {https://doi.org/10.1109/CISS.2009.5054719},
  doi       = {10.1109/CISS.2009.5054719},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ciss/ZaidiHKMGK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucLKK09,
  author    = {Dang Nguyen Duc and
               Hyunrok Lee and
               Divyan M. Konidala and
               Kwangjo Kim},
  title     = {Open issues in {RFID} security},
  booktitle = {Proceedings of the 4th International Conference for Internet Technology
               and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
               2009},
  pages     = {1--5},
  year      = {2009},
  crossref  = {DBLP:conf/icitst/2009},
  url       = {http://ieeexplore.ieee.org/document/5402510/},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/DucLKK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/ParkKK09,
  author    = {Hyewon Park and
               Zeen Kim and
               Kwangjo Kim},
  title     = {Forward Secure ID-Based Group Key Agreement Protocol with Anonymity},
  booktitle = {The Third International Conference on Emerging Security Information,
               Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada,
               Greece},
  pages     = {274--279},
  year      = {2009},
  crossref  = {DBLP:conf/securware/2009},
  url       = {https://doi.org/10.1109/SECURWARE.2009.49},
  doi       = {10.1109/SECURWARE.2009.49},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securware/ParkKK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wts/MunHK09,
  author    = {Hyeran Mun and
               Kyusuk Han and
               Kwangjo Kim},
  title     = {3G-WLAN interworking: security analysis and new authentication and
               key agreement based on {EAP-AKA}},
  booktitle = {2009 Wireless Telecommunications Symposium, {WTS} 2009, Prague, Czech
               Republic, April 22-24, 2009},
  pages     = {1--8},
  year      = {2009},
  crossref  = {DBLP:conf/wts/2009},
  url       = {https://doi.org/10.1109/WTS.2009.5068983},
  doi       = {10.1109/WTS.2009.5068983},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wts/MunHK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTWK09,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Haibo Tian and
               Baodian Wei and
               Kwangjo Kim},
  title     = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete
               Logarithm Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {35},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/035},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenZTWK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiRK09,
  author    = {Jin Li and
               Kui Ren and
               Kwangjo Kim},
  title     = {{A2BE:} Accountable Attribute-Based Encryption for Abuse Free Access
               Control},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {118},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/118},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LiRK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTK09,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Haibo Tian and
               Kwangjo Kim},
  title     = {Identity-Based Chameleon Hash Scheme Without Key Exposure},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {400},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/400},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenZTK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucK09,
  author    = {Dang Nguyen Duc and
               Kwangjo Kim},
  title     = {Grouping-Proof Protocol for {RFID} Tags: Security Definition and Scalable
               Construction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {609},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/609},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucK09a,
  author    = {Dang Nguyen Duc and
               Kwangjo Kim},
  title     = {Security Analysis of {A} Remote User Authentication Protocol by Liao
               and Wang},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {610},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/610},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucK09a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/VoK08,
  author    = {Duc{-}Liem Vo and
               Kwangjo Kim},
  title     = {A secure mutual authentication scheme with key agreement using smart
               card from bilinear pairings},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {23},
  number    = {3},
  year      = {2008},
  timestamp = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csse/VoK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenZTWSMLK08,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Haibo Tian and
               Baodian Wei and
               Willy Susilo and
               Yi Mu and
               Hyunrok Lee and
               Kwangjo Kim},
  title     = {Efficient generic on-line/off-line (threshold) signatures without
               key exposure},
  journal   = {Inf. Sci.},
  volume    = {178},
  number    = {21},
  pages     = {4192--4203},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.ins.2008.06.022},
  doi       = {10.1016/j.ins.2008.06.022},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/ChenZTWSMLK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YeunHVK08,
  author    = {Chan Yeob Yeun and
               Kyusuk Han and
               Duc{-}Liem Vo and
               Kwangjo Kim},
  title     = {Secure authenticated group key agreement protocol in the {MANET} environment},
  journal   = {Inf. Sec. Techn. Report},
  volume    = {13},
  number    = {3},
  pages     = {158--164},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.istr.2008.10.002},
  doi       = {10.1016/j.istr.2008.10.002},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/istr/YeunHVK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiKZW08,
  author    = {Jin Li and
               Kwangjo Kim and
               Fangguo Zhang and
               Duncan S. Wong},
  title     = {Generic Security-Amplifying Methods of Ordinary Digital Signatures},
  booktitle = {Applied Cryptography and Network Security, 6th International Conference,
               {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  pages     = {224--241},
  year      = {2008},
  crossref  = {DBLP:conf/acns/2008},
  url       = {https://doi.org/10.1007/978-3-540-68914-0\_14},
  doi       = {10.1007/978-3-540-68914-0\_14},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/LiKZW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiK08,
  author    = {Jin Li and
               Kwangjo Kim},
  title     = {Attribute-Based Ring Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {394},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/394},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LiK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/VoK07,
  author    = {Duc{-}Liem Vo and
               Kwangjo Kim},
  title     = {Security Analysis of an ID-Based Key Agreement for Peer Group Communication},
  journal   = {{IEICE} Transactions},
  volume    = {90-A},
  number    = {11},
  pages     = {2624--2625},
  year      = {2007},
  url       = {https://doi.org/10.1093/ietfec/e90-a.11.2624},
  doi       = {10.1093/ietfec/e90-a.11.2624},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/VoK07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HeoKK07,
  author    = {Sungchul Heo and
               Zeen Kim and
               Kwangjo Kim},
  title     = {Certificateless Authenticated Group Key Agreement Protocol for Dynamic
               Groups},
  booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
               '07, Washington, DC, USA, 26-30 November 2007},
  pages     = {464--468},
  year      = {2007},
  crossref  = {DBLP:conf/globecom/2007},
  url       = {https://doi.org/10.1109/GLOCOM.2007.93},
  doi       = {10.1109/GLOCOM.2007.93},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/HeoKK07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimKK07,
  author    = {Jangseong Kim and
               Zeen Kim and
               Kwangjo Kim},
  title     = {A Lightweight Privacy Preserving Authentication and Access Control
               Scheme for Ubiquitous Computing Environment},
  booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International
               Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  pages     = {37--48},
  year      = {2007},
  crossref  = {DBLP:conf/icisc/2007},
  url       = {https://doi.org/10.1007/978-3-540-76788-6\_4},
  doi       = {10.1007/978-3-540-76788-6\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/KimKK07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiYK07,
  author    = {Jin Li and
               Tsz Hon Yuen and
               Kwangjo Kim},
  title     = {Practical Threshold Signatures Without Random Oracles},
  booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  pages     = {198--207},
  year      = {2007},
  crossref  = {DBLP:conf/provsec/2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5\_14},
  doi       = {10.1007/978-3-540-75670-5\_14},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/LiYK07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiKZC07,
  author    = {Jin Li and
               Kwangjo Kim and
               Fangguo Zhang and
               Xiaofeng Chen},
  title     = {Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature},
  booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  pages     = {208--217},
  year      = {2007},
  crossref  = {DBLP:conf/provsec/2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5\_15},
  doi       = {10.1007/978-3-540-75670-5\_15},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/LiKZC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/RenLKD06,
  author    = {Kui Ren and
               Wenjing Lou and
               Kwangjo Kim and
               Robert H. Deng},
  title     = {A novel privacy preserving authentication and access control scheme
               for pervasive computing environments},
  journal   = {{IEEE} Trans. Vehicular Technology},
  volume    = {55},
  number    = {4},
  pages     = {1373--1384},
  year      = {2006},
  url       = {https://doi.org/10.1109/TVT.2006.877704},
  doi       = {10.1109/TVT.2006.877704},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tvt/RenLKD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/SeoLK06,
  author    = {Youngjoon Seo and
               Hyunrok Lee and
               Kwangjo Kim},
  title     = {A Scalable and Untraceable Authentication Protocol for {RFID}},
  booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
               Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
               August 1-4, 2006, Proceedings},
  pages     = {252--261},
  year      = {2006},
  crossref  = {DBLP:conf/euc/2006w},
  url       = {https://doi.org/10.1007/11807964\_26},
  doi       = {10.1007/11807964\_26},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euc/SeoLK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KonidalaK06,
  author    = {Divyan M. Konidala and
               Kwangjo Kim},
  title     = {Mobile {RFID} Applications and Security Challenges},
  booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International
               Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  pages     = {194--205},
  year      = {2006},
  crossref  = {DBLP:conf/icisc/2006},
  url       = {https://doi.org/10.1007/11927587\_17},
  doi       = {10.1007/11927587\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/KonidalaK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhangK05,
  author    = {Fangguo Zhang and
               Kwangjo Kim},
  title     = {Cryptanalysis of Lee-Hwang-Li's key authentication scheme},
  journal   = {Applied Mathematics and Computation},
  volume    = {161},
  number    = {1},
  pages     = {101--107},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2003.12.012},
  doi       = {10.1016/j.amc.2003.12.012},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/ZhangK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LvWK05,
  author    = {Jiqiang Lv and
               Xinmei Wang and
               Kwangjo Kim},
  title     = {Security of a multisignature scheme for specified group of verifiers},
  journal   = {Applied Mathematics and Computation},
  volume    = {166},
  number    = {1},
  pages     = {58--63},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.04.108},
  doi       = {10.1016/j.amc.2004.04.108},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/LvWK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LvWK05a,
  author    = {Jiqiang Lv and
               Xinmei Wang and
               Kwangjo Kim},
  title     = {Practical convertible authenticated encryption schemes using self-certified
               public keys},
  journal   = {Applied Mathematics and Computation},
  volume    = {169},
  number    = {2},
  pages     = {1285--1297},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.10.057},
  doi       = {10.1016/j.amc.2004.10.057},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/LvWK05a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/VoK05,
  author    = {Duc{-}Liem Vo and
               Kwangjo Kim},
  title     = {Yet Another Forward Secure Signature from Bilinear Pairings},
  booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  pages     = {441--455},
  year      = {2005},
  crossref  = {DBLP:conf/icisc/2005},
  url       = {https://doi.org/10.1007/11734727\_34},
  doi       = {10.1007/11734727\_34},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/VoK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ParkKK05,
  author    = {Jaemin Park and
               Zeen Kim and
               Kwangjo Kim},
  title     = {State-based key management scheme for wireless sensor networks},
  booktitle = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems,
               {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington,
               {USA}},
  year      = {2005},
  crossref  = {DBLP:conf/mass/2005},
  url       = {https://doi.org/10.1109/MAHSS.2005.1542877},
  doi       = {10.1109/MAHSS.2005.1542877},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mass/ParkKK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KonidalaDLK05,
  author    = {Divyan M. Konidala and
               Dang Nguyen Duc and
               Dongman Lee and
               Kwangjo Kim},
  title     = {A Capability-Based Privacy-Preserving Scheme for Pervasive Computing
               Environments},
  booktitle = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
               (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
  pages     = {136--140},
  year      = {2005},
  crossref  = {DBLP:conf/percom/2005w},
  url       = {https://doi.org/10.1109/PERCOMW.2005.3},
  doi       = {10.1109/PERCOMW.2005.3},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/KonidalaDLK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RenLWBDK04,
  author    = {Kui Ren and
               Tieyan Li and
               Zhiguo Wan and
               Feng Bao and
               Robert H. Deng and
               Kwangjo Kim},
  title     = {Highly reliable trust establishment scheme in ad hoc networks},
  journal   = {Computer Networks},
  volume    = {45},
  number    = {6},
  pages     = {687--699},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.comnet.2004.01.008},
  doi       = {10.1016/j.comnet.2004.01.008},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/RenLWBDK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinYK04,
  author    = {SungJun Min and
               Go Yamamoto and
               Kwangjo Kim},
  title     = {Weak Property of Malleability in NTRUSign},
  booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  pages     = {379--390},
  year      = {2004},
  crossref  = {DBLP:conf/acisp/2004},
  url       = {https://doi.org/10.1007/978-3-540-27800-9\_33},
  doi       = {10.1007/978-3-540-27800-9\_33},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MinYK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenZK04,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Kwangjo Kim},
  title     = {Limited Verifier Signature from Bilinear Pairings},
  booktitle = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  pages     = {135--148},
  year      = {2004},
  crossref  = {DBLP:conf/acns/2004},
  url       = {https://doi.org/10.1007/978-3-540-24852-1\_10},
  doi       = {10.1007/978-3-540-24852-1\_10},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/ChenZK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/LeeBDKYY04,
  author    = {Byoungcheon Lee and
               Colin Boyd and
               Ed Dawson and
               Kwangjo Kim and
               Jeongmo Yang and
               Seungjae Yoo},
  title     = {Secure Key Issuing in ID-based Cryptography},
  booktitle = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information
               Security Workshop (AISW2004), the Australasian Workshop on Data Mining
               and Web Intelligence (DMWI2004), and the Australasian Workshop on
               Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand,
               January 2004},
  pages     = {69--74},
  year      = {2004},
  crossref  = {DBLP:conf/acsw/2004},
  url       = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Lee.html},
  timestamp = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/LeeBDKYY04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LeeHKKI04,
  author    = {Songwon Lee and
               Kyusuk Han and
               Seok{-}kyu Kang and
               Kwangjo Kim and
               So Ran Ine},
  title     = {Threshold Password-Based Authentication Using Bilinear Pairings},
  booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and
               Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
               Proceedings},
  pages     = {350--363},
  year      = {2004},
  crossref  = {DBLP:conf/europki/2004},
  url       = {https://doi.org/10.1007/978-3-540-25980-0\_29},
  doi       = {10.1007/978-3-540-25980-0\_29},
  timestamp = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/LeeHKKI04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KonidalaYK04,
  author    = {Divyan M. Konidala and
               Chan Yeob Yeun and
               Kwangjo Kim},
  title     = {A secure and privacy enhanced protocol for location-based services
               in ubiquitous society},
  booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
               '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages     = {2164--2168},
  year      = {2004},
  crossref  = {DBLP:conf/globecom/2004},
  url       = {https://doi.org/10.1109/GLOCOM.2004.1378393},
  doi       = {10.1109/GLOCOM.2004.1378393},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/KonidalaYK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/RenLHPK04,
  author    = {Kui Ren and
               Hyunrok Lee and
               Kyusuk Han and
               Jaemin Park and
               Kwangjo Kim},
  title     = {An enhanced lightweight authentication protocol for access control
               in wireless LANs},
  booktitle = {12th {IEEE} International Conference on Networks, {ICON} 2004, Singapore,
               November 16-19 2004},
  pages     = {444--450},
  year      = {2004},
  crossref  = {DBLP:conf/icon/2004},
  url       = {https://doi.org/10.1109/ICON.2004.1409206},
  doi       = {10.1109/ICON.2004.1409206},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icon/RenLHPK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChenZKK04,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Divyan M. Konidala and
               Kwangjo Kim},
  title     = {New ID-Based Threshold Signature Scheme from Bilinear Pairings},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  pages     = {371--383},
  year      = {2004},
  crossref  = {DBLP:conf/indocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30556-9\_29},
  doi       = {10.1007/978-3-540-30556-9\_29},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/ChenZKK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenZK04,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Kwangjo Kim},
  title     = {Chameleon Hashing Without Key Exposure},
  booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo
               Alto, CA, USA, September 27-29, 2004, Proceedings},
  pages     = {87--98},
  year      = {2004},
  crossref  = {DBLP:conf/isw/2004},
  url       = {https://doi.org/10.1007/978-3-540-30144-8\_8},
  doi       = {10.1007/978-3-540-30144-8\_8},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/ChenZK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RenLKY04,
  author    = {Kui Ren and
               Hyunrok Lee and
               Kwangjo Kim and
               Taewhan Yoo},
  title     = {Efficient Authenticated Key Agreement Protocol for Dynamic Groups},
  booktitle = {Information Security Applications, 5th International Workshop, {WISA}
               2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  pages     = {144--159},
  year      = {2004},
  crossref  = {DBLP:conf/wisa/2004},
  url       = {https://doi.org/10.1007/978-3-540-31815-6\_13},
  doi       = {10.1007/978-3-540-31815-6\_13},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/RenLKY04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK04,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Kwangjo Kim},
  title     = {Chameleon Hashing without Key Exposure},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {38},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/038},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenZK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NarayananRK03,
  author    = {Arvind Narayanan and
               C. Pandu Rangan and
               Kwangjo Kim},
  title     = {Practical Pay {TV} Schemes},
  booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
               2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  pages     = {192--203},
  year      = {2003},
  crossref  = {DBLP:conf/acisp/2003},
  url       = {https://doi.org/10.1007/3-540-45067-X\_17},
  doi       = {10.1007/3-540-45067-X\_17},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/NarayananRK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangK03,
  author    = {Fangguo Zhang and
               Kwangjo Kim},
  title     = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear
               Pairings},
  booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
               2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  pages     = {312--323},
  year      = {2003},
  crossref  = {DBLP:conf/acisp/2003},
  url       = {https://doi.org/10.1007/3-540-45067-X\_27},
  doi       = {10.1007/3-540-45067-X\_27},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ZhangK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LeeKKR03,
  author    = {Sangwon Lee and
               Yongdae Kim and
               Kwangjo Kim and
               DaeHyun Ryu},
  title     = {An Efficient Tree-Based Group Key Agreement Using Bilinear Map},
  booktitle = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  pages     = {357--371},
  year      = {2003},
  crossref  = {DBLP:conf/acns/2003},
  url       = {https://doi.org/10.1007/978-3-540-45203-4\_28},
  doi       = {10.1007/978-3-540-45203-4\_28},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/LeeKKR03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ChoiK03,
  author    = {SuGil Choi and
               Kwangjo Kim},
  title     = {Authentication and payment protocol preserving location privacy in
               mobile {IP}},
  booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
               '03, San Francisco, CA, USA, 1-5 December 2003},
  pages     = {1410--1414},
  year      = {2003},
  crossref  = {DBLP:conf/globecom/2003},
  url       = {https://doi.org/10.1109/GLOCOM.2003.1258470},
  doi       = {10.1109/GLOCOM.2003.1258470},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/ChoiK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DucCK03,
  author    = {Dang Nguyen Duc and
               Jung Hee Cheon and
               Kwangjo Kim},
  title     = {A Forward-Secure Blind Signature Scheme Based on the Strong {RSA}
               Assumption},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {11--21},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_2},
  doi       = {10.1007/978-3-540-39927-8\_2},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/DucCK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XieZCK03,
  author    = {Yan Xie and
               Fangguo Zhang and
               Xiaofeng Chen and
               Kwangjo Kim},
  title     = {ID-Based Distributed "Magic Ink" Signature from Pairings},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {249--259},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_23},
  doi       = {10.1007/978-3-540-39927-8\_23},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/XieZCK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeBDKYY03,
  author    = {Byoungcheon Lee and
               Colin Boyd and
               Ed Dawson and
               Kwangjo Kim and
               Jeongmo Yang and
               Seungjae Yoo},
  title     = {Providing Receipt-Freeness in Mixnet-Based Voting Protocols},
  booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International
               Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  pages     = {245--258},
  year      = {2003},
  crossref  = {DBLP:conf/icisc/2003},
  url       = {https://doi.org/10.1007/978-3-540-24691-6\_19},
  doi       = {10.1007/978-3-540-24691-6\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/LeeBDKYY03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenLK03,
  author    = {Xiaofeng Chen and
               Byoungcheon Lee and
               Kwangjo Kim},
  title     = {Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption},
  booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International
               Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  pages     = {259--273},
  year      = {2003},
  crossref  = {DBLP:conf/icisc/2003},
  url       = {https://doi.org/10.1007/978-3-540-24691-6\_20},
  doi       = {10.1007/978-3-540-24691-6\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/ChenLK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/VinodNSRK03,
  author    = {Vinod Vaikuntanathan and
               Arvind Narayanan and
               K. Srinathan and
               C. Pandu Rangan and
               Kwangjo Kim},
  title     = {On the Power of Computational Secret Sharing},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
               on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  pages     = {162--176},
  year      = {2003},
  crossref  = {DBLP:conf/indocrypt/2003},
  url       = {https://doi.org/10.1007/978-3-540-24582-7\_12},
  doi       = {10.1007/978-3-540-24582-7\_12},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/VinodNSRK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiKK03,
  author    = {SuGil Choi and
               Kwangjo Kim and
               ByeongGon Kim},
  title     = {Practical Solution for Location Privacy in Mobile IPv6},
  booktitle = {Information Security Applications, 4th International Workshop, {WISA}
               2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  pages     = {69--83},
  year      = {2003},
  crossref  = {DBLP:conf/wisa/2003},
  url       = {https://doi.org/10.1007/978-3-540-24591-9\_6},
  doi       = {10.1007/978-3-540-24591-9\_6},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/ChoiKK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK03,
  author    = {Fangguo Zhang and
               Kwangjo Kim},
  title     = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {11},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/011},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhangK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK03,
  author    = {Xiaofeng Chen and
               Fangguo Zhang and
               Kwangjo Kim},
  title     = {A New ID-based Group Signature Scheme from Bilinear Pairings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {116},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/116},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenZK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/LeeAKPLKL02,
  author    = {Manho Lee and
               Gookwhan Ahn and
               Jinho Kim and
               Jaegwan Park and
               Byoungcheon Lee and
               Kwangjo Kim and
               Hyuckjae Lee},
  title     = {Design and implementation of an efficient fair off-line e-cash system
               based on elliptic curve discrete logarithm problem},
  journal   = {Journal of Communications and Networks},
  volume    = {4},
  number    = {2},
  pages     = {81--89},
  year      = {2002},
  url       = {https://doi.org/10.1109/JCN.2002.6596898},
  doi       = {10.1109/JCN.2002.6596898},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcn/LeeAKPLKL02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLK02,
  author    = {Fangguo Zhang and
               Shengli Liu and
               Kwangjo Kim},
  title     = {Compact Representation of Domain Parameters of Hyperelliptic Curve
               Cryptosystems},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {203--213},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_17},
  doi       = {10.1007/3-540-45450-0\_17},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ZhangLK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimK02,
  author    = {Myungsun Kim and
               Kwangjo Kim},
  title     = {A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {362--378},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_28},
  doi       = {10.1007/3-540-45450-0\_28},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/KimK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangK02,
  author    = {Fangguo Zhang and
               Kwangjo Kim},
  title     = {ID-Based Blind Signature and Ring Signature from Pairings},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  pages     = {533--547},
  year      = {2002},
  crossref  = {DBLP:conf/asiacrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36178-2\_33},
  doi       = {10.1007/3-540-36178-2\_33},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/ZhangK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KimKK02,
  author    = {Myungsun Kim and
               Jongseong Kim and
               Kwangjo Kim},
  title     = {Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman
               Assumption},
  booktitle = {Information and Communications Security, 4th International Conference,
               {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  pages     = {97--108},
  year      = {2002},
  crossref  = {DBLP:conf/icics/2002},
  url       = {https://doi.org/10.1007/3-540-36159-6\_9},
  doi       = {10.1007/3-540-36159-6\_9},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/KimKK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeK02,
  author    = {Byoungcheon Lee and
               Kwangjo Kim},
  title     = {Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer},
  booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International
               Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  pages     = {389--406},
  year      = {2002},
  crossref  = {DBLP:conf/icisc/2002},
  url       = {https://doi.org/10.1007/3-540-36552-4\_27},
  doi       = {10.1007/3-540-36552-4\_27},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/LeeK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LeeK02,
  author    = {Byoungcheon Lee and
               Kwangjo Kim},
  title     = {Self-certified Signatures},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
               on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  pages     = {199--214},
  year      = {2002},
  crossref  = {DBLP:conf/indocrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36231-2\_17},
  doi       = {10.1007/3-540-36231-2\_17},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/LeeK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2001,
  editor    = {Kwangjo Kim},
  title     = {Information Security and Cryptology - {ICISC} 2001, 4th International
               Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2288},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45861-1},
  doi       = {10.1007/3-540-45861-1},
  isbn      = {3-540-43319-8},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02,
  author    = {Fangguo Zhang and
               Shengli Liu and
               Kwangjo Kim},
  title     = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol
               with Pairings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {122},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/122},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhangLK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK02,
  author    = {Fangguo Zhang and
               Kwangjo Kim},
  title     = {Cryptanalysis of Two New Signature Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {167},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/167},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhangK02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02a,
  author    = {Fangguo Zhang and
               Shengli Liu and
               Kwangjo Kim},
  title     = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {178},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/178},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhangLK02a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhnK01,
  author    = {Gail{-}Joon Ahn and
               Kwangjo Kim},
  title     = {{CONUGA:} Constrained User-Group Assignment},
  journal   = {J. Network and Computer Applications},
  volume    = {24},
  number    = {2},
  pages     = {87--100},
  year      = {2001},
  url       = {https://doi.org/10.1006/jnca.2000.0125},
  doi       = {10.1006/jnca.2000.0125},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/AhnK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeKK01,
  author    = {Byoungcheon Lee and
               Heesun Kim and
               Kwangjo Kim},
  title     = {Secure Mobile Agent Using Strong Non-designated Proxy Signature},
  booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  pages     = {474},
  year      = {2001},
  crossref  = {DBLP:conf/acisp/2001},
  url       = {https://doi.org/10.1007/3-540-47719-5\_37},
  doi       = {10.1007/3-540-47719-5\_37},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/LeeKK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CheonKKLK01,
  author    = {Jung Hee Cheon and
               MunJu Kim and
               Kwangjo Kim and
               Jung{-}Yeun Lee and
               SungWoo Kang},
  title     = {Improved Impossible Differential Cryptanalysis of Rijndael and Crypton},
  booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International
               Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  pages     = {39--49},
  year      = {2001},
  crossref  = {DBLP:conf/icisc/2001},
  url       = {https://doi.org/10.1007/3-540-45861-1\_4},
  doi       = {10.1007/3-540-45861-1\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/CheonKKLK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimKL01,
  author    = {Jinho Kim and
               Kwangjo Kim and
               Chulsoo Lee},
  title     = {An Efficient and Provably Secure Threshold Blind Signature},
  booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International
               Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  pages     = {318--327},
  year      = {2001},
  crossref  = {DBLP:conf/icisc/2001},
  url       = {https://doi.org/10.1007/3-540-45861-1\_24},
  doi       = {10.1007/3-540-45861-1\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/KimKL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LeeKM01,
  author    = {Byoungcheon Lee and
               Kwangjo Kim and
               Joongsoo Ma},
  title     = {Efficient Public Auction with One-Time Registration and Public Verifiability},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
               on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  pages     = {162--174},
  year      = {2001},
  crossref  = {DBLP:conf/indocrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45311-3\_16},
  doi       = {10.1007/3-540-45311-3\_16},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/LeeKM01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2001,
  editor    = {Kwangjo Kim},
  title     = {Public Key Cryptography, 4th International Workshop on Practice and
               Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
               February 13-15, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1992},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44586-2},
  doi       = {10.1007/3-540-44586-2},
  isbn      = {3-540-41658-7},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaekLK00,
  author    = {Joonsang Baek and
               Byoungcheon Lee and
               Kwangjo Kim},
  title     = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman
               Assumption},
  booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  pages     = {49--58},
  year      = {2000},
  crossref  = {DBLP:conf/acisp/2000},
  url       = {https://doi.org/10.1007/10718964\_5},
  doi       = {10.1007/10718964\_5},
  timestamp = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaekLK00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeK00,
  author    = {Byoungcheon Lee and
               Kwangjo Kim},
  title     = {Secure Matchmaking Protocol},
  booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International
               Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  pages     = {123--134},
  year      = {2000},
  crossref  = {DBLP:conf/icisc/2000},
  url       = {https://doi.org/10.1007/3-540-45247-8\_10},
  doi       = {10.1007/3-540-45247-8\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/LeeK00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SongK00,
  author    = {Boyeon Song and
               Kwangjo Kim},
  title     = {Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
               in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  pages     = {237--249},
  year      = {2000},
  crossref  = {DBLP:conf/indocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44495-5\_21},
  doi       = {10.1007/3-540-44495-5\_21},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/SongK00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/AhnKY00,
  author    = {Gookwhan Ahn and
               Kwangjo Kim and
               Hee Yong Youn},
  title     = {Tapping Alert Protocol},
  booktitle = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure
               for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg,
               MD, {USA}},
  pages     = {159--164},
  year      = {2000},
  crossref  = {DBLP:conf/wetice/2000},
  url       = {https://doi.org/10.1109/ENABL.2000.883721},
  doi       = {10.1109/ENABL.2000.883721},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wetice/AhnKY00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SeoK99,
  author    = {Moonseog Seo and
               Kwangjo Kim},
  title     = {Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption
               Scheme},
  booktitle = {Information Security and Cryptology - ICISC'99, Second International
               Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  pages     = {269--277},
  year      = {1999},
  crossref  = {DBLP:conf/icisc/1999},
  url       = {https://doi.org/10.1007/10719994\_21},
  doi       = {10.1007/10719994\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/SeoK99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/KimPB99,
  author    = {Kwangjo Kim and
               Sangjoon Park and
               Joonsang Baek},
  title     = {Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation
               Protocol},
  booktitle = {Proceedings of the 1999 International Conference on Parallel Processing
               Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages     = {140--145},
  year      = {1999},
  crossref  = {DBLP:conf/icppw/1999},
  url       = {https://doi.org/10.1109/ICPPW.1999.800053},
  doi       = {10.1109/ICPPW.1999.800053},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icppw/KimPB99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ParkLSK97,
  author    = {Sung{-}Mo Park and
               Sangjin Lee and
               Soo Hak Sung and
               Kwangjo Kim},
  title     = {Improving Bounds for the Number of Correlation Immune Boolean Functions},
  journal   = {Inf. Process. Lett.},
  volume    = {61},
  number    = {4},
  pages     = {209--212},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0020-0190(97)00010-0},
  doi       = {10.1016/S0020-0190(97)00010-0},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/ParkLSK97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ParkPKW97,
  author    = {Sangjoon Park and
               Sangwoo Park and
               Kwangjo Kim and
               Dongho Won},
  title     = {Two efficient {RSA} multisignature schemes},
  booktitle = {Information and Communication Security, First International Conference,
               ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  pages     = {217--222},
  year      = {1997},
  crossref  = {DBLP:conf/icics/1997},
  url       = {https://doi.org/10.1007/BFb0028477},
  doi       = {10.1007/BFb0028477},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ParkPKW97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1996,
  editor    = {Kwangjo Kim and
               Tsutomu Matsumoto},
  title     = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Kyongju, Korea, November 3-7, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1163},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/BFb0034829},
  doi       = {10.1007/BFb0034829},
  isbn      = {3-540-61872-4},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CheeLK94,
  author    = {Seongtaek Chee and
               Sangjin Lee and
               Kwangjo Kim},
  title     = {Semi-bent Functions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
               on the Theory and Applications of Cryptology, Wollongong, Australia,
               November 28 - December 1, 1994, Proceedings},
  pages     = {107--118},
  year      = {1994},
  crossref  = {DBLP:conf/asiacrypt/1994},
  url       = {https://doi.org/10.1007/BFb0000428},
  doi       = {10.1007/BFb0000428},
  timestamp = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CheeLK94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Kim91,
  author    = {Kwangjo Kim},
  title     = {Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng
               the {SAC}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
               on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
               November 11-14, 1991, Proceedings},
  pages     = {59--72},
  year      = {1991},
  crossref  = {DBLP:conf/asiacrypt/1991},
  url       = {https://doi.org/10.1007/3-540-57332-1\_5},
  doi       = {10.1007/3-540-57332-1\_5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/Kim91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimMI90,
  author    = {Kwangjo Kim and
               Tsutomu Matsumoto and
               Hideki Imai},
  title     = {A Recursive Construction Method of S-boxes Satisfying Strict Avalanche
               Criterion},
  booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  pages     = {564--574},
  year      = {1990},
  crossref  = {DBLP:conf/crypto/1990},
  url       = {https://doi.org/10.1007/3-540-38424-3\_39},
  doi       = {10.1007/3-540-38424-3\_39},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/KimMI90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ml4cs/2019,
  editor    = {Xiaofeng Chen and
               Xinyi Huang and
               Jun Zhang},
  title     = {Machine Learning for Cyber Security - Second International Conference,
               {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11806},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-30619-9},
  doi       = {10.1007/978-3-030-30619-9},
  isbn      = {978-3-030-30618-2},
  timestamp = {Tue, 17 Sep 2019 13:22:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ml4cs/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2018,
  editor    = {Brent ByungHoon Kang and
               Jin Soo Jang},
  title     = {Information Security Applications - 19th International Conference,
               {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11402},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-17982-3},
  doi       = {10.1007/978-3-030-17982-3},
  isbn      = {978-3-030-17981-6},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwbis/2017,
  title     = {International Workshop on Big Data and Information Security, {IWBIS}
               2017, Jakarta, Indonesia, September 23-24, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8263128/proceeding},
  isbn      = {978-1-5386-2038-0},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwbis/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2017w,
  title     = {2017 {IEEE} International Conference on Pervasive Computing and Communications
               Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
               13-17, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7911894/proceeding},
  isbn      = {978-1-5090-4338-5},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2017,
  editor    = {Brent ByungHoon Kang and
               Taesoo Kim},
  title     = {Information Security Applications - 18th International Conference,
               {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10763},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93563-8},
  doi       = {10.1007/978-3-319-93563-8},
  isbn      = {978-3-319-93562-1},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigcomp/2016,
  title     = {2016 International Conference on Big Data and Smart Computing, BigComp
               2016, Hong Kong, China, January 18-20, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7422342/proceeding},
  isbn      = {978-1-4673-8796-5},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bigcomp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2016,
  editor    = {Orr Dunkelman and
               Somitra Kumar Sanadhya},
  title     = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
               on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10095},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49890-4},
  doi       = {10.1007/978-3-319-49890-4},
  isbn      = {978-3-319-49889-8},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2016,
  editor    = {Dooho Choi and
               Sylvain Guilley},
  title     = {Information Security Applications - 17th International Workshop, {WISA}
               2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10144},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56549-1},
  doi       = {10.1007/978-3-319-56549-1},
  isbn      = {978-3-319-56548-4},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2015,
  title     = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
               Kaohsiung City, Taiwan, May 24-26, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7153314/proceeding},
  isbn      = {978-1-4799-1989-5},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiajcis/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2015,
  editor    = {Mohammad S. Obaidat and
               Pascal Lorenz and
               Pierangela Samarati},
  title     = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015},
  publisher = {SciTePress},
  year      = {2015},
  isbn      = {978-989-758-117-5},
  timestamp = {Thu, 06 Aug 2015 12:56:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcsw/2014,
  title     = {34th International Conference on Distributed Computing Systems Workshops
               {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6888816/proceeding},
  isbn      = {978-1-4799-4181-0},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2013,
  title     = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
               Seoul, Korea, July 25-26, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6621628/proceeding},
  isbn      = {978-0-7695-5075-6},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiajcis/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2011,
  title     = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
               Joint Conference of the {IEEE} Computer and Communications Societies,
               10-15 April 2011, Shanghai, China},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5888673/proceeding},
  isbn      = {978-1-4244-9921-2},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2010,
  editor    = {Ron Steinfeld and
               Philip Hawkes},
  title     = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
               2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6168},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14081-5},
  doi       = {10.1007/978-3-642-14081-5},
  isbn      = {978-3-642-14080-8},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2010,
  editor    = {Jan Camenisch and
               Costas Lambrinoudakis},
  title     = {Public Key Infrastructures, Services and Applications - 7th European
               Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6711},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22633-5},
  doi       = {10.1007/978-3-642-22633-5},
  isbn      = {978-3-642-22632-8},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010,
  editor    = {Radu Sion},
  title     = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6052},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3},
  doi       = {10.1007/978-3-642-14577-3},
  isbn      = {978-3-642-14576-6},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2010,
  title     = {5th International Conference for Internet Technology and Secured Transactions,
               {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5672505/proceeding},
  isbn      = {978-1-4244-8862-9},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ciss/2009,
  title     = {43rd Annual Conference on Information Sciences and Systems, {CISS}
               2009, The John Hopkins University, Baltimore, MD, USA, 18-20 March
               2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4976858/proceeding},
  isbn      = {978-1-4244-2733-8},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ciss/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2009,
  title     = {Proceedings of the 4th International Conference for Internet Technology
               and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
               2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5393958/proceeding},
  isbn      = {978-1-4244-5648-2},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securware/2009,
  editor    = {Rainer Falk and
               Wilson Goudalo and
               Eric Y. Chen and
               Reijo Savola and
               Manuela Popescu},
  title     = {The Third International Conference on Emerging Security Information,
               Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada,
               Greece},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5210973/proceeding},
  isbn      = {978-0-7695-3668-2},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securware/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wts/2009,
  title     = {2009 Wireless Telecommunications Symposium, {WTS} 2009, Prague, Czech
               Republic, April 22-24, 2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4977245/proceeding},
  isbn      = {978-1-4244-2588-4},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wts/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2008,
  editor    = {Steven M. Bellovin and
               Rosario Gennaro and
               Angelos D. Keromytis and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, 6th International Conference,
               {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5037},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68914-0},
  doi       = {10.1007/978-3-540-68914-0},
  isbn      = {978-3-540-68913-3},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2007,
  title     = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
               '07, Washington, DC, USA, 26-30 November 2007},
  publisher = {{IEEE}},
  year      = {2007},
  timestamp = {Wed, 18 Mar 2009 14:08:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2007,
  editor    = {Kil{-}Hyun Nam and
               Gwangsoo Rhee},
  title     = {Information Security and Cryptology - {ICISC} 2007, 10th International
               Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4817},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-76788-6},
  doi       = {10.1007/978-3-540-76788-6},
  isbn      = {978-3-540-76787-9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2007,
  editor    = {Willy Susilo and
               Joseph K. Liu and
               Yi Mu},
  title     = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4784},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5},
  doi       = {10.1007/978-3-540-75670-5},
  isbn      = {978-3-540-75669-9},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euc/2006w,
  editor    = {Xiaobo Zhou and
               Oleg Sokolsky and
               Lu Yan and
               Eun{-}Sun Jung and
               Zili Shao and
               Yi Mu and
               Dong Chun Lee and
               Daeyoung Kim and
               Young{-}Sik Jeong and
               Cheng{-}Zhong Xu},
  title     = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
               Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
               August 1-4, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4097},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11807964},
  doi       = {10.1007/11807964},
  isbn      = {3-540-36850-7},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euc/2006w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2006,
  editor    = {Min Surp Rhee and
               Byoungcheon Lee},
  title     = {Information Security and Cryptology - {ICISC} 2006, 9th International
               Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4296},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11927587},
  doi       = {10.1007/11927587},
  isbn      = {3-540-49112-0},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2005,
  editor    = {Dongho Won and
               Seungjoo Kim},
  title     = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3935},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11734727},
  doi       = {10.1007/11734727},
  isbn      = {3-540-33354-1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mass/2005,
  title     = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems,
               {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/10355/proceeding},
  isbn      = {0-7803-9465-8},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mass/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2005w,
  title     = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
               (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/9593/proceeding},
  isbn      = {0-7695-2300-5},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/2005w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2004,
  editor    = {Huaxiong Wang and
               Josef Pieprzyk and
               Vijay Varadharajan},
  title     = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3108},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98755},
  doi       = {10.1007/b98755},
  isbn      = {3-540-22379-7},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2004,
  editor    = {Markus Jakobsson and
               Moti Yung and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3089},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98360},
  doi       = {10.1007/b98360},
  isbn      = {3-540-22217-0},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsw/2004,
  editor    = {James M. Hogan and
               Paul Montague and
               Martin K. Purvis and
               Chris Steketee},
  title     = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information
               Security Workshop (AISW2004), the Australasian Workshop on Data Mining
               and Web Intelligence (DMWI2004), and the Australasian Workshop on
               Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand,
               January 2004},
  series    = {{CRPIT}},
  volume    = {32},
  publisher = {Australian Computer Society},
  year      = {2004},
  isbn      = {1-920682-14-7},
  timestamp = {Thu, 05 Oct 2017 11:44:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2004,
  editor    = {Sokratis K. Katsikas and
               Stefanos Gritzalis and
               Javier L{\'{o}}pez},
  title     = {Public Key Infrastructure, First European PKIWorkshop: Research and
               Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3093},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98201},
  doi       = {10.1007/b98201},
  isbn      = {3-540-22216-2},
  timestamp = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2004,
  title     = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
               '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/9481/proceeding},
  isbn      = {0-7803-8794-5},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icon/2004,
  editor    = {Hung Keng Pung and
               Francis Bu{-}Sung Lee and
               Chen{-}Kong Tham and
               Saira Kuttan},
  title     = {12th {IEEE} International Conference on Networks, {ICON} 2004, Singapore,
               November 16-19 2004},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/9669/proceeding},
  isbn      = {0-7803-8783-X},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icon/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2004,
  editor    = {Anne Canteaut and
               Kapalee Viswanathan},
  title     = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3348},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b104579},
  doi       = {10.1007/b104579},
  isbn      = {3-540-24130-2},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2004,
  editor    = {Kan Zhang and
               Yuliang Zheng},
  title     = {Information Security, 7th International Conference, {ISC} 2004, Palo
               Alto, CA, USA, September 27-29, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3225},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100936},
  doi       = {10.1007/b100936},
  isbn      = {3-540-23208-7},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2004,
  editor    = {Chae Hoon Lim and
               Moti Yung},
  title     = {Information Security Applications, 5th International Workshop, {WISA}
               2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3325},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b103174},
  doi       = {10.1007/b103174},
  isbn      = {3-540-24015-2},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2003,
  editor    = {Reihaneh Safavi{-}Naini and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
               2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2727},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-45067-X},
  doi       = {10.1007/3-540-45067-X},
  isbn      = {3-540-40515-1},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2003,
  editor    = {Jianying Zhou and
               Moti Yung and
               Yongfei Han},
  title     = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2846},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13996},
  doi       = {10.1007/b13996},
  isbn      = {3-540-20208-0},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2003,
  title     = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
               '03, San Francisco, CA, USA, 1-5 December 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8900/proceeding},
  isbn      = {0-7803-7974-8},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2003,
  editor    = {Sihan Qing and
               Dieter Gollmann and
               Jianying Zhou},
  title     = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2836},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13930},
  doi       = {10.1007/b13930},
  isbn      = {3-540-20150-5},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2003,
  editor    = {Jong In Lim and
               Dong Hoon Lee},
  title     = {Information Security and Cryptology - {ICISC} 2003, 6th International
               Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2971},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b96249},
  doi       = {10.1007/b96249},
  isbn      = {3-540-21376-7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2003,
  editor    = {Thomas Johansson and
               Subhamoy Maitra},
  title     = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
               on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2904},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b94593},
  doi       = {10.1007/b94593},
  isbn      = {3-540-20609-4},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2003,
  editor    = {Kijoon Chae and
               Moti Yung},
  title     = {Information Security Applications, 4th International Workshop, {WISA}
               2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2908},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95188},
  doi       = {10.1007/b95188},
  isbn      = {3-540-20827-5},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2002,
  editor    = {Lynn Margaret Batten and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2384},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45450-0},
  doi       = {10.1007/3-540-45450-0},
  isbn      = {3-540-43861-0},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2002,
  editor    = {Yuliang Zheng},
  title     = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2501},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36178-2},
  doi       = {10.1007/3-540-36178-2},
  isbn      = {3-540-00171-9},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2002,
  editor    = {Robert H. Deng and
               Sihan Qing and
               Feng Bao and
               Jianying Zhou},
  title     = {Information and Communications Security, 4th International Conference,
               {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2513},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36159-6},
  doi       = {10.1007/3-540-36159-6},
  isbn      = {3-540-00164-6},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2002,
  editor    = {Pil Joong Lee and
               Chae Hoon Lim},
  title     = {Information Security and Cryptology - {ICISC} 2002, 5th International
               Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2587},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36552-4},
  doi       = {10.1007/3-540-36552-4},
  isbn      = {3-540-00716-4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2002,
  editor    = {Alfred Menezes and
               Palash Sarkar},
  title     = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
               on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series    = {Lecture Notes in Computer Science},
  volume    = {2551},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36231-2},
  doi       = {10.1007/3-540-36231-2},
  isbn      = {3-540-00263-4},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2001,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2119},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-47719-5},
  doi       = {10.1007/3-540-47719-5},
  isbn      = {3-540-42300-1},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2001,
  editor    = {C. Pandu Rangan and
               Cunsheng Ding},
  title     = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
               on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2247},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45311-3},
  doi       = {10.1007/3-540-45311-3},
  isbn      = {3-540-43010-5},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2000,
  editor    = {Ed Dawson and
               Andrew J. Clark and
               Colin Boyd},
  title     = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1841},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10718964},
  doi       = {10.1007/10718964},
  isbn      = {3-540-67742-9},
  timestamp = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2000,
  editor    = {Dongho Won},
  title     = {Information Security and Cryptology - {ICISC} 2000, Third International
               Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2015},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45247-8},
  doi       = {10.1007/3-540-45247-8},
  isbn      = {3-540-41782-6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2000,
  editor    = {Bimal K. Roy and
               Eiji Okamoto},
  title     = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
               in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1977},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44495-5},
  doi       = {10.1007/3-540-44495-5},
  isbn      = {3-540-41452-5},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wetice/2000,
  title     = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure
               for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg,
               MD, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7094/proceeding},
  isbn      = {0-7695-0798-0},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wetice/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/1999,
  editor    = {JooSeok Song},
  title     = {Information Security and Cryptology - ICISC'99, Second International
               Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1787},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10719994},
  doi       = {10.1007/10719994},
  isbn      = {3-540-67380-6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icppw/1999,
  title     = {Proceedings of the 1999 International Conference on Parallel Processing
               Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6501/proceeding},
  isbn      = {0-7695-0353-5},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icppw/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/1997,
  editor    = {Yongfei Han and
               Tatsuaki Okamoto and
               Sihan Qing},
  title     = {Information and Communication Security, First International Conference,
               ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1334},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0028456},
  doi       = {10.1007/BFb0028456},
  isbn      = {3-540-63696-X},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1994,
  editor    = {Josef Pieprzyk and
               Reihaneh Safavi{-}Naini},
  title     = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
               on the Theory and Applications of Cryptology, Wollongong, Australia,
               November 28 - December 1, 1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {917},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/BFb0000419},
  doi       = {10.1007/BFb0000419},
  isbn      = {3-540-59339-X},
  timestamp = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1991,
  editor    = {Hideki Imai and
               Ronald L. Rivest and
               Tsutomu Matsumoto},
  title     = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
               on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
               November 11-14, 1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {739},
  publisher = {Springer},
  year      = {1993},
  url       = {https://doi.org/10.1007/3-540-57332-1},
  doi       = {10.1007/3-540-57332-1},
  isbn      = {3-540-57332-1},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1991},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1990,
  editor    = {Alfred Menezes and
               Scott A. Vanstone},
  title     = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {537},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-38424-3},
  doi       = {10.1007/3-540-38424-3},
  isbn      = {3-540-54508-5},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics