Search Results - "Haksoo Ju"
-
1
Clone resistant mutual authentication using two broadcast encryption
Published in 2009 Digest of Technical Papers International Conference on Consumer Electronics (01-01-2009)“…This paper provides a clone resistant mutual authentication between Secure Digital (SD) memory cards and host devices. The existing mutual authentication using…”
Get full text
Conference Proceeding -
2
The algorithm to enhance the security of multi-agent in distributed computing environment
Published in 12th International Conference on Parallel and Distributed Systems - (ICPADS'06) (2006)“…The usages of public key infrastructure (PKI) in secure e-mail service, e-commerce service, client authentication service with SSL, etc. have increased…”
Get full text
Conference Proceeding -
3
Authentication mechanism with immediate revocation in POD copy protection system
Published in 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE) (01-01-2010)“…An authentication mechanism between POD (Point-of-Deployment) and Host devices depends on Certificate Revocation Lists (CRLs). One of the shortcomings of CRLs…”
Get full text
Conference Proceeding