Showing results 16481 to 16500 of 22817
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04 |
Secure Group Services for Storage Area Networks Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Secure quantum communication by preserving an optimal measurement Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29 |
Secure Remote Desktop with Necklace-Type Security Device Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10 |
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04 |
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11 |
Secure Type-Based Muliple Access with Power Control 황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05 |
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12 |
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30 |
Secure UAV Communications with Transmit-array Antenna Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05 |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Security vulnerability in Processor-Interconnect Router Design wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11 |
See-through LCDs using transparent light-guide plates Choi, W.-S.; Lee, J.-H.; Yeon, J.; Yoon, Jun-Bo, 15th International Display Workshops, IDW '08, pp.459 - 462, 2008-12-03 |
Seed growing for interactive image segmentation with geodesic voting Park, Sun Jeong; Lee, Han Sang; Kim, Junmo, 23rd IEEE International Conference on Image Processing (ICIP), IEEE Signal Processing Society, 2016-09 |
Seed light 주입형 RSOA 기반 WDM PON의 외부반사에 대한 내성 분석 정윤철; 전현채; 조근영; Takushima, Y, 광자기술 학술회의, 2008 |
Discover