To search, Click below search items.
All Published Papers Search Service
Title
Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow
Author
Hyunjue Kim, Seungjoo Kim, Dongho Won
Vol. 6 No. 1 pp. 247~250
Keywords
ID-based cryptography, Key escrow problem, Secure key issuing
Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó
Nalini N, G Raghavendra Rao
Vol. 6 No. 1 pp. 240~246
A Case Study in Applying IT Security Evaluation on Common Criteria to Development Process of MTOS 7.5
Shim ho Kim
Vol. 6 No. 1 pp. 234~239
IT security evaluation, Common Criteria, Development process, MTOS 7.5
A Processor Development Environment C-DASH
Hideaki Yanagisawa, Minoru Uehara, Hideki Mori
Vol. 6 No. 1 pp. 227~233
ISA (Instruction Set Architecture), HW/SW Codesign (A Processor Development Environment), C-DASH (C-like Design Automation Shell, HDL (Hardware Description Language)