scispace - formally typeset
Search or ask a question
Institution

Information and Communications University

About: Information and Communications University is a based out in . It is known for research contribution in the topics: Quality of service & CMOS. The organization has 1186 authors who have published 1811 publications receiving 30258 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the adjustment effect of the switching barrier on customer satisfaction and customer loyalty is analyzed. But the authors focus on customer loyalty in the context of the IMT-2000 service and the scheduled introduction of mobile number portability.

971 citations

Book ChapterDOI
06 Jan 2003
TL;DR: In this paper, an identity-based signature scheme using gap Diffie-Hellman (GDH) groups was proposed and proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model.
Abstract: In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. Using GDH groups obtained from bilinear pairings, as a special case of our scheme, we obtain an ID-based signature scheme that shares the same system parameters with the ID-based encryption scheme (BF-IBE) by Boneh and Franklin [BF01], and is as efficient as the BF-IBE. Combining our signature scheme with the BF-IBE yields a complete solution of an ID-based public key system. It can be an alternative for certificate-based public key infrastructures, especially when efficient key management and moderate security are required.

869 citations

Posted Content
TL;DR: In this article, an identity-based signature scheme using gap Diffie-Hellman (GDH) groups was proposed and proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model.
Abstract: In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. Using GDH groups obtained from bilinear pairings, as a special case of our scheme, we obtain an ID-based signature scheme that shares the same system parameters with the ID-based encryption scheme (BF-IBE) by Boneh and Franklin [BF01], and is as efficient as the BF-IBE. Combining our signature scheme with the BF-IBE yields a complete solution of an ID-based public key system. It can be an alternative for certificate-based public key infrastructures, especially when efficient key management and moderate security are required.

858 citations

Journal ArticleDOI
TL;DR: Analysis of the factors that influence potential users' adoption of MBWA games using an extension of TAM found that the effect of perceived enjoyment was very important but that usefulness did not influence an individual's attitude.

602 citations

Journal ArticleDOI
TL;DR: The human motivations underlying individual behavioral intention to use M‐internet in Korea are examined, including perceived playfulness, contents quality, system quality, internet experience and perceived price level in addition to perceived usefulness and ease of use.
Abstract: Purpose – The increasing number of M‐internet subscribers and the fast growing revenue proves the great potential of M‐internet as well as the enormous business opportunity in Korea. The success in this business is dependent on understanding the concerns of customers and identifying the factors that promote the use of M‐internet. Thus, this paper aims to examine the human motivations underlying individual behavioral intention to use M‐internet in Korea.Design/methodology/approach – Employs TAM (technology acceptance model) as the base model and develops a more comprehensive version of TAM to better reflect M‐internet context. The model employs perceived playfulness, contents quality, system quality, internet experience and perceived price level, in addition to perceived usefulness and ease of use. Investigates the causal relationships among the constructs used in this revised TAM and identifies the direct and indirect causal role of the constructs in developing the intention to use M‐internet.Findings – F...

573 citations


Authors

Showing all 1186 results

NameH-indexPapersCitations
Kui Ren8350132490
Jang-Joo Kim6744315812
Xiaofeng Chen5740213507
Qing X. Li5362613661
Suk-Joong L. Kang422396754
Moshe Zukerman423706964
Kwangjo Kim422607315
Dae Young Kim422995423
Yong Man Ro404816352
Sang-Gug Lee404376945
Dan Keun Sung404807127
Jung Hee Cheon392497571
Changick Kim362295098
Daeyoung Kim355215840
Fangguo Zhang342835244
Network Information
Related Institutions (5)
Samsung
163.6K papers, 2M citations

88% related

National Chiao Tung University
52.4K papers, 956.2K citations

88% related

KAIST
77.6K papers, 1.8M citations

88% related

Fujitsu
75K papers, 827.5K citations

87% related

NEC
57.6K papers, 835.9K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
20217
20203
20194
20181
20172