Browse by Title 

Showing results 172941 to 172960 of 275593

172941
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

172942
Securing Database on Controlling Transactions in Multilevel Secure Databases

Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01

172943
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

172944
Securing design checking service for the regulation-based product design

Kim, Ikjune; Lee, Jaechul; Mun, Duhwan; Jun, Hongbae; Hwang, Jinsang; Kim, Jeong Tae; Han, Soonhung, COMPUTERS IN INDUSTRY, v.63, no.6, pp.586 - 596, 2012-08

172945
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

172946
Securing HB+ against GRS Man-in-the-Middle Attack

Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

172947
Securing legacy kernel with type-guided refactoring to rust = 러스트에서 타입 기반 리팩토링을 통한 기존 커널 보호link

Park, Sanguk; Ryu, Sukyoung; et al, 한국과학기술원, 2021

172948
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

172949
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

172950
Securing networked systems by protocol dialecting methods = 프로토콜 방언 기법을 이용한 네트워크 시스템 보안link

Noh, Jiseong; Kang, Brent Byunghoon; 강병훈; Shin, Seungwon; et al, 한국과학기술원, 2019

172951
Securing software-defined WAN through analyzing network attack surfaces = 네트워크 공격 표면 분석을 통한 소프트웨어 정의 WAN 보안성 향상에 관한 연구link

Kim, Jinwoo; Shin, Seungwon; et al, 한국과학기술원, 2022

172952
Securing Web Service by Automatic Robot Detection

Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02

172953
Security analysis of an ID-based key agreement for peer group communication

Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11

172954
Security analysis of end-to-end encryption in Telegram

Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26

172955
Security analysis of FHSS-based drone controller = 주파수 도약식 드론 조종기의 보안성 분석link

SHIN, HOCHEOL; 신호철; et al, 한국과학기술원, 2015

172956
Security Analysis of FHSS-type Drone Controller

Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21

172957
Security analysis of LTE baseband layer software = LTE Baseband 소프트웨어 취약점 연구link

Kim Eunsoo; Kim, Yongdae; et al, 한국과학기술원, 2016

172958
Security analysis of multi-path routing scheme in ad hoc networks

Jeong, JM; Ma, JoongSoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.694 - 697, 2004

172959
Security analysis of networking elements in cellular core networks = 이동통신 코어망 구성요소의 보안성 분석link

Hong, Hyunwook; 홍현욱; et al, 한국과학기술원, 2017

172960
Security analysis of quantum key distribution on passive optical networks

Lim, Kyongchun; Ko, Heasin; Suh, Changho; Rhee, June-Koo Kevin, OPTICS EXPRESS, v.25, no.10, pp.11894 - 11909, 2017-05

rss_1.0 rss_2.0 atom_1.0