Showing results 70801 to 70820 of 99873
Secure group communication with low communication complexity Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004 |
Secure Group Communication with Low Communication Complexity Kim, Heeyoul; Lee, Jaewon; Yoon, hyunsoo, Lecture Notes in Computer Science, Volume 3320/2005, 586-590, 2004-12 |
Secure group key management for storage area networks Kim, Yongdae; Maino, F; Narasimha, M; Rhee, KH; Tsudik, G, IEEE COMMUNICATIONS MAGAZINE, v.41, no.8, pp.92 - 99, 2003-08 |
Secure Inter-Container Communications Using XDP/eBPF Nam, Jaehyun; Lee, Seungsoo; Porras, Phillip; Yegneswaran, Vinod; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947, 2023-04 |
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000 |
Secure localization with phantom node detection Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09 |
Secure Many-to-Many Multicast in Heterogeneous Networks Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11 |
Secure MatchMaking Protocols Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12 |
Secure mobile agent using strong non-designated proxy signature Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07 |
Secure mobile device structure for trust IoT Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12 |
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud Lee, Younho; Kim, Pyung; Park, Yongsu, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18, 2016 |
Secure one snapshot protocol for concurrency control in real-time stock trading systems Kim, N; Moon, Songchun; Sohn, Y, JOURNAL OF SYSTEMS AND SOFTWARE, v.73, no.3, pp.441 - 454, 2004-11 |
Secure Personal Content Networking over Untrusted Devices Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02 |
Secure quantum key expansion between two parties sharing a key Ji, SW; Lee, Hai-Woong; Long, GL, JOURNAL OF THE KOREAN PHYSICAL SOCIETY, v.51, pp.1245 - 1251, 2007-10 |
Secure query processing against encrypted XML data using Query-Aware Decryption Lee, Jae-Gil; Whang, Kyu-Young, INFORMATION SCIENCES, v.176, no.13, pp.1928 - 1947, 2006-07 |
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09 |
Secure transmission in downlink cellular network with a Cooperative Jammer Jeong, S.; Lee, Keon-Kook; Huh, Hoon; Kang, Joonhyuk, IEEE Wireless Communications Letters, v.2, no.4, pp.463 - 466, 2013-08 |
Secure Type-Based Multiple Access Jeon, Hyoungsuk; Hwang, Daesung; Choi, JH; Lee, HyuckJae; Ha, Jeongseok, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.6, pp.763 - 774, 2011-09 |
Secure video transmission framework for battery-powered video devices Go, Kyungmin; Lee, Ilgu; Kang, Sungwon; Kim, Myung-Chul, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.1, pp.275 - 287, 2022-01 |
Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori Seo, Junghaa; Park, Sangwoo; Kang, Joonhyuk, ICT EXPRESS, v.8, no.2, pp.220 - 224, 2022-06 |
Discover