Mathematical Analysis of Secrecy Amplification in Key Infection Dae Hyun YUM
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2016/09/01 Vol. E99-DNo. 9 ;
pp. 2390-2394 Type of Manuscript: LETTER Category: Information Network Keyword: sensor network, smart dust, key management, key infection,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2016/08/01 Vol. E99-DNo. 8 ;
pp. 2036-2043 Type of Manuscript: Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things) Category: Keyword: multi-cloud, multi-level security, erasure code, data dispersal, key management,
Publication: IEICE TRANSACTIONS on Communications Publication Date: 2016/05/01 Vol. E99-BNo. 5 ;
pp. 1054-1069 Type of Manuscript: Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services) Category: Keyword: secure communication, network infrastructure, key management, Quantum Key Distribution,
A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks Song GUOAn-Ni SHENMinyi GUO
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2010/03/01 Vol. E93-DNo. 3 ;
pp. 421-429 Type of Manuscript: INVITED PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications) Category: Keyword: key management, group rekeying, hierarchical wireless sensor network, security,
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding Su-Wan PARKSang Uk SHIN
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2009/05/01 Vol. E92-DNo. 5 ;
pp. 851-858 Type of Manuscript: Special Section PAPER (Special Section on Information and Communication System Security) Category: Contents Protection Keyword: H.264/SVC, scalable video coding (SVC), encryption, key management, access right,
Publication: IEICE TRANSACTIONS on Communications Publication Date: 2008/11/01 Vol. E91-BNo. 11 ;
pp. 3574-3583 Type of Manuscript: PAPER Category: Fundamental Theories for Communications Keyword: ad hoc networks, network security, key management, self-organized,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2008/05/01 Vol. E91-DNo. 5 ;
pp. 1319-1329 Type of Manuscript: Special Section PAPER (Special Section on Information and Communication System Security) Category: Implementation Keyword: IKEv2, key management, IPsec, network security, open-source,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2006/06/01 Vol. E89-ANo. 6 ;
pp. 1842-1846 Type of Manuscript: PAPER Category: Mobile Information Network and Personal Communications Keyword: mobile IP, registration protocol, AAA, authentication, key management,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2006/04/01 Vol. E89-ANo. 4 ;
pp. 1108-1115 Type of Manuscript: PAPER Category: Information Security Keyword: fingerprinting protocol, key management, asymmetric property, symmetric cryptosystem,
Publication: IEICE TRANSACTIONS on Communications Publication Date: 2004/05/01 Vol. E87-BNo. 5 ;
pp. 1382-1385 Type of Manuscript: LETTER Category: Fundamental Theories Keyword: authentication, wireless security, EAP method, key management, 802.11i,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2003/01/01 Vol. E86-ANo. 1 ;
pp. 129-135 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocols etc. Keyword: key management, framework, tree-based, multiple content distribution systems,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2001/01/01 Vol. E84-ANo. 1 ;
pp. 108-113 Type of Manuscript: INVITED PAPER (Special Section on Cryptography and Information Security) Category: Keyword: modern cryptography, key management, zero-knowledge proof, elliptic curve applications,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2001/01/01 Vol. E84-ANo. 1 ;
pp. 61-67 Type of Manuscript: INVITED PAPER (Special Section on the 10th Anniversary of the IEICE Transactions of Fundamentals: "Last Decade and 21st Century") Category: Keyword: cryptology, secret-key cryptography, public-key cryptography, key management, humancrypt,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 1993/01/25 Vol. E76-ANo. 1 ;
pp. 78-87 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: key management, ID-based, RSA, complementary exponential calculation,