Browse by Type Article

Showing results 70801 to 70820 of 99873

70801
Secure group communication with low communication complexity

Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004

70802
Secure Group Communication with Low Communication Complexity

Kim, Heeyoul; Lee, Jaewon; Yoon, hyunsoo, Lecture Notes in Computer Science, Volume 3320/2005, 586-590, 2004-12

70803
Secure group key management for storage area networks

Kim, Yongdae; Maino, F; Narasimha, M; Rhee, KH; Tsudik, G, IEEE COMMUNICATIONS MAGAZINE, v.41, no.8, pp.92 - 99, 2003-08

70804
Secure Inter-Container Communications Using XDP/eBPF

Nam, Jaehyun; Lee, Seungsoo; Porras, Phillip; Yegneswaran, Vinod; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947, 2023-04

70805
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000

70806
Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

70807
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

70808
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

70809
Secure mobile agent using strong non-designated proxy signature

Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07

70810
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

70811
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

Lee, Younho; Kim, Pyung; Park, Yongsu, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18, 2016

70812
Secure one snapshot protocol for concurrency control in real-time stock trading systems

Kim, N; Moon, Songchun; Sohn, Y, JOURNAL OF SYSTEMS AND SOFTWARE, v.73, no.3, pp.441 - 454, 2004-11

70813
Secure Personal Content Networking over Untrusted Devices

Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02

70814
Secure quantum key expansion between two parties sharing a key

Ji, SW; Lee, Hai-Woong; Long, GL, JOURNAL OF THE KOREAN PHYSICAL SOCIETY, v.51, pp.1245 - 1251, 2007-10

70815
Secure query processing against encrypted XML data using Query-Aware Decryption

Lee, Jae-Gil; Whang, Kyu-Young, INFORMATION SCIENCES, v.176, no.13, pp.1928 - 1947, 2006-07

70816
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO

Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09

70817
Secure transmission in downlink cellular network with a Cooperative Jammer

Jeong, S.; Lee, Keon-Kook; Huh, Hoon; Kang, Joonhyuk, IEEE Wireless Communications Letters, v.2, no.4, pp.463 - 466, 2013-08

70818
Secure Type-Based Multiple Access

Jeon, Hyoungsuk; Hwang, Daesung; Choi, JH; Lee, HyuckJae; Ha, Jeongseok, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.6, pp.763 - 774, 2011-09

70819
Secure video transmission framework for battery-powered video devices

Go, Kyungmin; Lee, Ilgu; Kang, Sungwon; Kim, Myung-Chul, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.1, pp.275 - 287, 2022-01

70820
Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori

Seo, Junghaa; Park, Sangwoo; Kang, Joonhyuk, ICT EXPRESS, v.8, no.2, pp.220 - 224, 2022-06

rss_1.0 rss_2.0 atom_1.0