Search Results - "Haksoo Ju"

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Clone resistant mutual authentication using two broadcast encryption by Sunnam Lee, Haksoo Ju, Bongseon Kim

    “…This paper provides a clone resistant mutual authentication between Secure Digital (SD) memory cards and host devices. The existing mutual authentication using…”
    Get full text
    Conference Proceeding
  2. 2

    The algorithm to enhance the security of multi-agent in distributed computing environment by Haeryong Park, Haksoo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh

    “…The usages of public key infrastructure (PKI) in secure e-mail service, e-commerce service, client authentication service with SSL, etc. have increased…”
    Get full text
    Conference Proceeding
  3. 3

    Authentication mechanism with immediate revocation in POD copy protection system by HakSoo Ju, SuhYun Nam, DaeYoub Kim

    “…An authentication mechanism between POD (Point-of-Deployment) and Host devices depends on Certificate Revocation Lists (CRLs). One of the shortcomings of CRLs…”
    Get full text
    Conference Proceeding