Showing results 172981 to 173000 of 275594
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security Evaluation of a CALS System Cha, Sungdeok, 제9회 화랑대 국제학술대회, pp.91 - 106, 1997 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security Framework for RFID-based Applications in Smart Home Environment Konidala, Divyan M.; Kim, Daeyoung; Yeun, Chan Yeob; Lee, Byoungcheon, JIPS(Journal of Information Processing Systems), v.7, no.1, pp.111 - 120, 2011-03 |
Security in Automotive Radar and Vehicular Networks Yeh, Enoch R.; Bhat, Chandra R.; Heath, Robert W., Jr.; Choi, Junil; Prelcic, Nuria G., MICROWAVE JOURNAL, v.60, no.5, pp.148 - 164, 2017-05 |
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR 김문철; 헨드리; 송영주; 정기호, 2012-10-31 |
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR Kim, Munchurl; HENDRY, Hendry; SONG, Young-Joo; JUNG, Ki-Ho |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Security notions for the random oracle model in classical and quantum settings Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
Security of a multisignature scheme for specified group of verifiers Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07 |
Security of consensus algorithm for stellar blockchain = 스텔라 블록체인 합의 알고리즘 보안성 분석link Kim, Minjeong; Kim, Yongdae; et al, 한국과학기술원, 2020 |
Security of Lu et al.'s proxy-protected signature scheme Park, JH; Kang, Bo Gyeong, APPLIED MATHEMATICS AND COMPUTATION, v.169, no.2, pp.1010 - 1015, 2005-10 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
Security of the Misty Structure beyond the Birthday Bound Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07 |
Security of the Misty Structure Using Involutions as Round Functions Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09 |
Security of truncated random permutations = 절단된 임의치환의 안전성link Choi, Wonseok; Hahn, Sanggeun; 한상근; Lee, Jooyoung; et al, 한국과학기술원, 2018 |
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08 |
Security practices and regulatory compliance in the healthcare industry Kwon, Juhee; Johnson, M. Eric, JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, v.20, no.1, pp.44 - 51, 2013-01 |
Security threats to Internet: a Korean multi-industry investigation Jung, B; Han, Ingoo; Lee, S, INFORMATION MANAGEMENT, v.38, no.8, pp.487 - 498, 2001-10 |
Security Trading Rule Synthesis: A Syntactic Pattern-Based Learning Approach Jhee, Won C; Lee, Kun C; Lee, Jae Kyu, HEURISTICS, v.5, no.4, pp.47 - 61, 1992 |
Discover