Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Youngkyung Lee"'
Publikováno v:
Applied Sciences, Vol 11, Iss 8, p 3367 (2021)
Non-interactive zero-knowledge (NIZK) proofs for chosen-ciphertext security are generally considered to give an impractical construction. An interesting recent work by Seo, Abdalla, Lee, and Park (Information Sciences, July 2019) proposed an efficien
Externí odkaz:
https://doaj.org/article/7612a4d83f4b40068d8e68d4a341d28a
Autor:
YoungKyung Lee
Publikováno v:
Japanese Cultural Studies. 83:183-205
Autor:
Juhyun Kim, Jihye Park, Heejin Kim, Namil Son, Eun‐Jung Kim, Jaeil Kim, Dohwan Byun, Youngkyung Lee, Yeong Mi Park, Divyashree C Nageswaran, Pallas Kuo, Teresa Rose, Tuong Vi T Dang, Ildoo Hwang, Christophe Lambing, Ian R Henderson, Kyuha Choi
Publikováno v:
EMBO J
The number of meiotic crossovers is tightly controlled and most depend on pro-crossover ZMM proteins, such as the E3 ligase HEI10. Despite the importance of HEI10 dosage for crossover formation, how HEI10 transcription is controlled remains unexplore
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76889d5ee0db0e526bb449020d4dee63
Publikováno v:
Theoretical Computer Science. 847:122-133
An identity-based signature (IBS) scheme can be generically constructed from any ordinary signature scheme by appending a chain of signatures. Until now, it has been known that a generic construction cannot lead to a tightly secure IBS scheme, althou
Publikováno v:
Designs, Codes and Cryptography. 88:2433-2452
The security of public-key encryption (PKE) schemes in a multi-user setting is aimed at capturing real-world scenarios in which an adversary could attack multiple users and multiple ciphertexts of its choice. However, the fact that a real-world adver
Publikováno v:
Journal of information security and applications
Journal of information security and applications, Elsevier, 2021, 63, pp.103003. ⟨10.1016/j.jisa.2021.103003⟩
Journal of information security and applications, 2021, 63, pp.103003. ⟨10.1016/j.jisa.2021.103003⟩
Journal of information security and applications, Elsevier, 2021, 63, pp.103003. ⟨10.1016/j.jisa.2021.103003⟩
Journal of information security and applications, 2021, 63, pp.103003. ⟨10.1016/j.jisa.2021.103003⟩
Dynamic group signatures ( DGS ) enable a user to generate a signature on behalf of a group of users, allowing a prospective user to join via an appropriate join protocol. A natural security requirement in the dynamic setting is to permit an adversar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9e2b3e3758674a103d974a6b1284a4ff
https://hal.inria.fr/hal-03442068
https://hal.inria.fr/hal-03442068
Publikováno v:
The Journal of Supercomputing. 75:1941-1952
With the recent advancements in information and communication technologies, the creation and storage of documents has become digitalized. Therefore, many documents are stored on computers. Documents containing personal information can be leaked by in
Publikováno v:
Applied Sciences, Vol 11, Iss 3367, p 3367 (2021)
Applied Sciences
Volume 11
Issue 8
Applied Sciences
Volume 11
Issue 8
Non-interactive zero-knowledge (NIZK) proofs for chosen-ciphertext security are generally considered to give an impractical construction. An interesting recent work by Seo, Abdalla, Lee, and Park (Information Sciences, July 2019) proposed an efficien
Publikováno v:
International Journal of Reliable Information and Assurance. 4:7-12
Autor:
Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee
Publikováno v:
Security and Communication Networks, Vol 2018 (2018)
Implantable medical devices (IMDs) continuously monitor the condition of a patient and directly apply treatments if considered necessary. Because IMDs are highly effective for patients who frequently visit hospitals (e.g., because of chronic illnesse