Zobrazeno 1 - 10
of 127
pro vyhledávání: '"Byoungcheon Lee"'
Autor:
Byoungcheon Lee, Min-su Kim
Publikováno v:
Jouranl of Information and Security. 20:53-58
Autor:
Byoungcheon Lee
Transport Layer Security (TLS) is a cryptographic protocol that provides communications security between two peers and it is widely used in many applications. To reduce the latency in TLS handshake session resumption using pre-shared key (PSK) had be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::466d94bdf56cb7bb9e5557852514a93a
Autor:
Byoungcheon Lee
Publikováno v:
Electronics, Vol 10, Iss 215, p 215 (2021)
Electronics
Volume 10
Issue 2
Electronics
Volume 10
Issue 2
In Wi-Fi Protected Access 3 (WPA3), a secure connection is established in two sequential stages. Firstly, in the authentication and association stage, a pairwise master key (PMK) is generated. Secondly, in the post-association stage, a pairwise trans
Autor:
Byoungcheon Lee
In WPA3 secure connection is executed in two sequential stages. Firstly, in authentication and association stage a pairwise master key (PMK) is generated. Secondly, in post-association stage a pairwise transient key (PTK) is generated from PMK using
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::29756e99f96021d7f44d25176758d05c
https://doi.org/10.20944/preprints202012.0341.v1
https://doi.org/10.20944/preprints202012.0341.v1
Autor:
Byoungcheon Lee
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 27:293-303
Autor:
Byoungcheon Lee
Publikováno v:
Journal of Security Engineering. 14:103-114
Autor:
Byoungcheon Lee
Publikováno v:
Journal of Security Engineering. 12:545-552
Identity-based cryptography is a public key cryptosystem in which any arbitrary string such as identity, email address of user can be used as a public key and the corresponding private key is generated by a private key generator (PKG) and given to th
Autor:
Byoungcheon Lee
Publikováno v:
Journal of Security Engineering. 11:273-286
Autor:
Divyan M. Konidala, Daeyoung Kim, Made Harta Dwijaksara, Dongman Lee, Soontae Kim, Kwangjo Kim, Byoungcheon Lee
Publikováno v:
Personal and Ubiquitous Computing. 16:643-654
Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads t
Autor:
Byoungcheon Lee, Haibo Tian, Xiaofeng Chen, Baodian Wei, Qianhong Wu, Hyun-Rok Lee, Kwangjo Kim, Fangguo Zhang
Publikováno v:
Information Sciences. 181:1493-1502
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [30] for lar