Browse "School of Electrical Engineering(전기및전자공학부)" by Title 

Showing results 33421 to 33440 of 51017

33421
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy

Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30

33422
Secure UAV Communications with Transmit-array Antenna

Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27

33423
Secure wireless communication evading eavesdropper via adversarial machine learning = 보안성 높은 무선통신을 위한 적대적 기계학습 기반의 도청자 회피 기법link

Seo, Junghaa; Kang, Joonhyuk; et al, 한국과학기술원, 2022

33424
Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori

Seo, Junghaa; Park, Sangwoo; Kang, Joonhyuk, ICT EXPRESS, v.8, no.2, pp.220 - 224, 2022-06

33425
SecureLinQ: Joint Precoding and Scheduling for Secure Device-to-Device Networks

Choi, Jinseok; Park, Jeonghun, IEEE WIRELESS COMMUNICATIONS LETTERS, v.9, no.12, pp.2078 - 2082, 2020-12

33426
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

33427
Securing software-defined WAN through analyzing network attack surfaces = 네트워크 공격 표면 분석을 통한 소프트웨어 정의 WAN 보안성 향상에 관한 연구link

Kim, Jinwoo; Shin, Seungwon; et al, 한국과학기술원, 2022

33428
Securing Web Service by Automatic Robot Detection

Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02

33429
Security analysis of FHSS-based drone controller = 주파수 도약식 드론 조종기의 보안성 분석link

SHIN, HOCHEOL; 신호철; et al, 한국과학기술원, 2015

33430
Security Analysis of FHSS-type Drone Controller

Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21

33431
Security analysis of multi-path routing scheme in ad hoc networks

Jeong, JM; Ma, JoongSoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.694 - 697, 2004

33432
Security analysis of quantum key distribution on passive optical networks

Lim, Kyongchun; Ko, Heasin; Suh, Changho; Rhee, June-Koo Kevin, OPTICS EXPRESS, v.25, no.10, pp.11894 - 11909, 2017-05

33433
Security analysis of quantum key distribution on passive optical networks

Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05

33434
Security analysis of VoLTE service and IMS network in cellular operators = VoLTE 보안 취약점 연구link

Kim, Hongil; 김홍일; et al, 한국과학기술원, 2015

33435
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdae; Zhang, Yanchao, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

33436
Security considerations in processor interconnect design = 프로세서 인터커넥트 네트워크에서의 보안문제link

Song, Won-Jun; 송원준; et al, 한국과학기술원, 2014

33437
Security in Automotive Radar and Vehicular Networks

Yeh, Enoch R.; Bhat, Chandra R.; Heath, Robert W., Jr.; Choi, Junil; Prelcic, Nuria G., MICROWAVE JOURNAL, v.60, no.5, pp.148 - 164, 2017-05

33438
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR

김문철; 헨드리; 송영주; 정기호, 2012-10-31

33439
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR

Kim, Munchurl; HENDRY, Hendry; SONG, Young-Joo; JUNG, Ki-Ho

33440
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0