nan

    , , , , , , , , , , , , , , ,
Vol. 18, No. 6, pp. 199-206, 10월. 2008
10.13089/JKIISC.2008.18.6.199, Full Text:
Keywords: broadcast eneryption, public-key BE, HIBE, authentication, Key Exchange, leakage-resilience, DH, RSA, Cryptographic Protocol, formal analysis, trusted freshness, Wireless Sensor Networks, Security, Key Predistribution, RFID, varying pseudonym, Traceability, denial of service
Abstract

nan

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
N. Jho, E. Yoo, M. Rhee, H. Imai, S. Shin, K. Kobara, K. Chen, L. Dong, X. Lai, Z. Li, G. Gong, Y. Yang, F. Bao, H. Chien and T. Wu, "Public key broadcast encryption scheme using new converting method," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 6, pp. 199-206, 2008. DOI: 10.13089/JKIISC.2008.18.6.199.

[ACM Style]
Nam-Su Jho, Eun-Sun Yoo, Man-Young Rhee, Hideki Imai, Seong-Han Shin, Kazukuni Kobara, Kefei Chen, Ling Dong, Xuejia Lai, Zhijun Li, Guang Gong, Yanjiang Yang, Feng Bao, Hung-Yu Chien, and Tzong-Chen Wu. 2008. Public key broadcast encryption scheme using new converting method. Journal of The Korea Institute of Information Security and Cryptology, 18, 6, (2008), 199-206. DOI: 10.13089/JKIISC.2008.18.6.199.