CS-Conference Papers(학술회의논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 5546

21

The collision security of tandem-DM in the ideal cipher model

Lee, Jooyoungresearcher; Stam, Martijn; Steinberger, JohnInternational Association for Cryptologic Research (IACR)31st Annual International Cryptology Conference, CRYPTO 2011, pp.561 - 577, 2011-08-14

22

The preimage security of double-block-length compression functions

Armknecht, Frederik; Fleischmann, Ewan; Krause, Matthias; Lee, Jooyoungresearcher; Stam, Martijn; Steinberger, JohnIACR17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, pp.233 - 251, 2011-12-04

23

Minimizing the two-round Even-Mansour cipher

Chen, Shan; Lampe, Rodolphe; Lee, Jooyoungresearcher; Seurin, Yannick; Steinberger, JohnInternational Association for Cryptologic Research (IACR)34rd Annual International Cryptology Conference, CRYPTO 2014, pp.39 - 56, 2014-08-17

24

The security of multiple encryption in the ideal cipher model

Dai, Yuanxi; Lee, Jooyoungresearcher; Mennink, Bart; Steinberger, JohnInternational Association for Cryptologic Research (IACR)34rd Annual International Cryptology Conference, CRYPTO 2014, pp.20 - 38, 2014-08-17

25

Relaxing full-codebook security: A refined analysis of key-length extension schemes

Gaži, Peter; Seurin, Yannick; Lee, Jooyoungresearcher; Steinberger, John; Tessaro, StefanoSpringer Verlag22nd International Workshop on Fast Software Encryption, FSE 2015, pp.319 - 341, 2015-03-08

26

An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer

Lee, Jooyoungresearcher; Cheon, Jung Hee; Hong, Hyunsook; Lee, JooheeMemorial University of NewfoundlandSelected Areas in Cryptography, 2016-08-12

27

Mode-expanded hybrid optical fiber Lissajous scanning probe for high signal-to-noise confocal imaging

장경원; 정기훈researcher; 양성표; 백승환; 김민혁(사)마이크로나노시스템학회KMEMS 2017, 2017-03-31

28

Protego: Cloud-Scale Multitenant IPsec Gateway

Jeongseok Son†; Moon, Sue-Bokresearcher; Yongqiang Xiong; Paul Wang; Ze Gan; Kun TanUSENIXUSENIX Annual Technical Conference 2017 (ATC '17), 2017-07-13

29

Toward building memory-safe network functions with modest performance overhead

Moon, Sue-BokresearcherUSENIXUSENIX Security '17, 2017-08-16

30

Hacking in Darkness: Return-oriented Programming against Secure Enclaves

Lee, JaeHyuk; Jinsoo Jang; Yeongjin Jang; Kwak, Nohyun; Choi, Yeseul; Choi, Changho; Taesoo Kim; Kang, Brent ByunghoonresearcherUSENIXUSENIX Security Symposium 2017, 2017-08-17

31

Observing Behaviors of Information Diffusion Models for Diverse Topics of Posts on VK

Myaeng, Sung-Hyonresearcher; Aisylu Khairullina; Jooyoung Lee; Gwan JangIEEEMobility Analytics from Spatial and Social Data, 2015-11-17

32

Food hazard event extraction based on news and social media: A preliminary work

Myaeng, Sung-Hyonresearcher; Kyoung-Rok Jang; Kangwook Lee; Gwan Jang; Seungyong Jung; Min-Gwan SeoKorean Institute of Information Scientists and Engineers2016 International Conference on Big Data and Smart Computing (BigComp), 2016-01-20

33

Social media analytics for understanding inter-region interest change dynamics and their causes

Jang, Gwanresearcher; Myaeng, Sung-HyonresearcherAssociation for Computing Machinery, Inc8th ACM Web Science Conference, WebSci 2016, pp.340 - 341, 2016-05-25

34

Discovering relations to augment a web-scale knowledge base constructed from the web

Kim, Jinho; Myaeng, Sung-HyonresearcherAssociation for Computing Machinery6th International Conference on Web Intelligence, Mining and Semantics, WIMS 2016, 2016-06-13

35

Capturing word choice patterns with LDA for fake review detection in sentiment analysis

Lee, Kyungyup Daniel; Han, Kyungah; Myaeng, Sung-HyonresearcherAssociation for Computing Machinery6th International Conference on Web Intelligence, Mining and Semantics, WIMS 2016, 2016-06-15

36

PTE: Enumerating trillion triangles on distributed systems

Park, Ha-Myung; Myaeng, Sung-Hyonresearcher; Kang, U.Association for Computing Machinery22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016, pp.1115 - 1124, 2016-08-17

37

Improving Android Battery Life Time by Exploiting Usage Patterns

Cho, Sunglae; Kang, SungwonresearcherKorean Society for Internet Information (KSII)The 8th International Conference on Internet (ICONI 2016), 2016-12

38

A Topic Transition Map for Query Expansion: A Topic Transition Map for Query Expansion : a Semantic Analysis of Clickthrough Data and Test Collections

Myaeng, Sung-Hyonresearcher; Kyungmin Kim; Yuchul JungUniversity of TasmaniaThe 29th Australasian Joint Conference on Artificial Intelligence, 2016-12-05

39

Partition Aware Connected Component Computation in Distributed Systems

Myaeng, Sung-Hyonresearcher; Ha-Myung Park; U KangIEEEICDM 2016 : The IEEE International Conference on Data Mining, 2016-12-15

40

Comparison of Software Product Line Test Derivation Methods from the Reuse Viewpoint

Kang, Sungwonresearcher; Kim, Jungmin; Baek, Haeun; Ahn, Hwi; jung, pilsu; Lee, JihyunICPSThe 6th International Conference on Software and Computer Applications (ICSCA 2017), 2017-02

rss_1.0 rss_2.0 atom_1.0