Kim-Kwang Raymond Choo
University of Texas at San Antonio
151 papers found
Refreshing results…
On the Anonymity of Some Authentication Schemes for Wireless Communications
Download from www.researchgate.netMoney Laundering and Terrorism Financing Risks of Prepaid Cards Instruments?
Download from www.researchgate.netCriminal Exploitation of Online Systems by Organised Crime Groups
UploadStrongly-Secure Identity-Based Key Agreement and Anonymous Extension
Download from www.researchgate.netSecret Signatures: How to Achieve Business Privacy Efficiently?
Download from www.researchgate.netSecurity of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
Download from www.researchgate.netThe importance of proofs of security for key establishment protocols
Download from www.researchgate.netOn the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol
Download from www.researchgate.netAn Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Download from www.researchgate.netRevisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol
Download from www.researchgate.netSecure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks
Download from www.researchgate.netFormal Analysis of Secure Contracting Protocol for E-Tendering
Download from www.researchgate.netA Secure Anonymous Authorisation Architecture for E-Commerce
UploadMissing publications? Search for publications with a matching author name.