Skip to main content

and
  1. Chapter and Conference Paper

    A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

    Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...

    Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee in NETWORKING 2008 Ad Hoc and Sensor Networks… (2008)

  2. No Access

    Chapter and Conference Paper

    A Secure DRM Framework for User’s Domain and Key Management

    Digital rights management(DRM) systems are used to control the use and distribution of copyrighted content. OMA specification creates devices collection of domain, and the use of contents is free in this domai...

    **heung Lee, Sanggon Lee, Sanguk Shin in Autonomic and Trusted Computing (2007)