Woo Kwon Koo

According to our database1, Woo Kwon Koo authored at least 4 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Two-stage tamper response in tamper-resistant software.
IET Softw., 2016

2014
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Public-Key Revocation and Tracing Schemes with Subset Difference Methods.
IACR Cryptol. ePrint Arch., 2013

2009
Security vulnerability in a non-interactive ID-based proxy re-encryption scheme.
Inf. Process. Lett., 2009


  Loading...