Showing results 61201 to 61260 of 90872
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04 |
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11 |
Secure Type-Based Muliple Access with Power Control 황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05 |
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12 |
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30 |
Secure UAV Communications with Transmit-array Antenna Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27 |
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27 |
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06 |
Secured radio communication based on fusion of cryptography algorithms Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01 |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Securing mobile agents by integrity-based encryption Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
Security and Privacy on Authentication Protocol for Low-cost RFID Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01 |
Security and Safeguard of Small Modular Reactors: Assessing Potential Risk for SMR Deployment in Southeast Asia Prawira, Andhika Yudha; Yasmine, Hanna; Yim, Man-Sung, 2023 INMM & ESARDA Joint Annual Meeting, Institute of Nuclear Materials Management (INMM) and ESARDA, 2023-05-23 |
Security Associations based Load Distribution among Parallel VPN servers Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Security notions for the random oracle model in classical and quantum settings Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
Security vulnerability in Processor-Interconnect Router Design wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11 |
Sediment characteristics and its impacts to water column in Han-river, Seoul, Korea Cho, Gye-Chun; Gil, K.I.; Kang, J.; Kim, L.H., 10th International Conferece on Urban Drainage, 2005-08 |
SEDRIS STF 데이터의 검증을 위한 변환 및 가시화 한순흥, 한국 시뮬레이션 학회 10' 춘계학술대회, 한국 시뮬레이션 학회, 2010-05-28 |
SEDRIS 합성환경 데이터 가시화를 위한 변환기 개발 강윤아; 김형기; 한순흥; 김만규, 2012 한국 CAD/CAM 학회 하계 학술대회, 한국 CAD/CAM 학회, 2012-08-23 |
SEDRIS를 사용한 국방 모의체계 합성환경 데이터베이스 구축 한순흥; 김형기, 육군 M&S 학술대회, 2010-11-18 |
SEDRIS를 활용한 실 환경 데이터의 합성환경 한순흥, 한국시뮬레이션학회 춘계학술대회, 한국시뮬레이션학회, 2011-05-28 |
See Video : An Interactive Video-on-Demand System Supporting Reliable Streaming of Stored Files Kang, SI; Song, Junehwa; Lee, Heung-Kyu, Proc. of ACIS Annual Int. Conf. on Computer and Information Science, IEEE, 2002-08 |
See-through LCDs using transparent light-guide plates Choi, W.-S.; Lee, J.-H.; Yeon, J.; Yoon, Jun-Bo, 15th International Display Workshops, IDW '08, pp.459 - 462, 2008-12-03 |
Seed Grain 방법에 의한 저전압용 Varistor 의 제조에 관한 연구 Kim, Chong Hee, 한국요업학외, 1985 |
Seed growing for interactive image segmentation with geodesic voting Park, Sun Jeong; Lee, Han Sang; Kim, Junmo, 23rd IEEE International Conference on Image Processing (ICIP), IEEE Signal Processing Society, 2016-09 |
Seed Layer를 이용한 PZT박막의 배향성 조절에 관한 연구 이원종; 강희수, 한국재료학회 춘계학술발표대회, pp.0 - 0, 2000-05-01 |
Seed light 주입형 RSOA 기반 WDM PON의 외부반사에 대한 내성 분석 정윤철; 전현채; 조근영; Takushima, Y, 광자기술 학술회의, 2008 |
Seed-Mediated Synthesis of Gold Nanorods and Surface Modification Based on Gold Binding Fusion Protein Hong, Won-Hi; Park, WM; Park, TJ; Lee, SY, The 21st International Symposium On Chemical Engineering Kyushu/Daejeon-Chungnam, 2008 |
Seeding ALD of high-k gate dielectric in CVD graphene FETs for enhanced device performance and reliability Shin, Woo Cheol; Cho, Byung Jin, Graphene Week 2012, 2012-06 |
SEED의 차분전력공격에 대한 강화 방안 장화선; 박상배; 김광조, 2003년도 한국정보보호학회 동계학술대회, pp.274 - 280, 한국정보보호학회, 2003-12-06 |
Seeing is slicing: Observation based slicing of picture description languages Yoo, Shin; Binkley, David; Eastman, Roger, 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, pp.175 - 184, Institute of Electrical and Electronics Engineers Inc., 2014-09-29 |
Seeing the previously unseen by optical imaging technologies 유홍기, 2019 대한의료기술혁신학회 추계 학술대회, 대한의료기술혁신학회, 2019-10-18 |
Seemingly Negligible Amounts of Platinum Nanoparticles Mislead Electrochemical Oxygen Reduction Reaction Pathway on Platinum Single‐Atom Catalysts Shin, SangYong; Kim, Hee Eun; Kim, Beom-Sik; Jeon, Sun Seo; Jeong, Hojin; Lee, Hyunjoo, 2022 MRS Spring Meeting & Exhibit, pp.3716 - 3719, Materials Research Society, 2022-05-10 |
SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments Kang, Seungwoo; Lee, Jinwon; Jang, Hyukjae; Lee, Hyonik; Lee, Youngki; Park, Souneil; Park, Taiwoo; et al, 6th International Conference on Mobile Systems, Applications, and Services, pp.267 - 280, Association for Computing Machinery (ACM), 2008-06-17 |
Seg&Struct: The Interplay Between Part Segmentation and Structure Inference for 3D Shape Parsing Kim, Jeonghyun; Mo, Kaichun; Sung, Minhyuk; Woo, Woontack, 23rd IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2023, pp.1226 - 1235, Institute of Electrical and Electronics Engineers Inc., 2023-01 |
SEGFUZZ: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing Jeong, Dae R; Lee, Byoungyoung; Shin, Insik; Kwon, Youngjin, 44th IEEE Symposium on Security and Privacy, SP 2023, IEEE, 2023-05-23 |
Segment Directory Enhancing the Limited Directory Cache Coherence Schemes Park, Kyu Ho; Choi, J.H., IPPS, 1999 |
Segment-hashing based trustworthy video audience measurement framework for MPEG-DASH Kim, Nakyoung; Oh, Hyeontaek; Choi, Jun Kyun; Yang, Jinhong, 9th International Conference on Ubiquitous and Future Networks, ICUFN 2017, pp.318 - 320, IEEE Computer Society, 2017-07-04 |
Segment-wise Online Learning based on Greedy Algorithm For Real-time Multi-target Tracking Lee, Chang Hoon; Yoo, Chang Dong, IEEE Conference on Image Processing, IEEE Signal Processing Society, 2015-09-28 |
Segment2Regress: Monocular 3D Vehicle Localization in Two Stages Choe, Jaesung; Joo, Kyungdon; Rameau, Francois; Shim, Gyu Min; Kweon, In-So, 15th Conference on Robotics - Science and Systems, Robotics: Science and Systems (RSS), 2019-06-25 |
Segmental Confidence Weighting for Recognition of Partly Contaminated Speech Cho, HY; Kim, LY; Oh, Yung-Hwan, Proc. ICSP, pp.643 - 648, ICSP, 2001-08 |
Segmental CRF 기반의 음성인식 성능 향상을 위한 음소 군집 심볼 이벤트 검출기 개발 조근석; 박상준; 정호영; 한민수, 대한전자공학회 하계학술대회, pp.890 - 893, 대한전자공학회, 2013-07-05 |
Segmental Mobility of Stereoregular PMMA's in a Homologous Series of Solvents Kim, CH; Kim, DW; Park, Jung-Ki, 1991 한국고분자학회 추계학술발표회, pp.0 - 0, 한국고분자학회, 1991-10-01 |
Segmental Two-Dimensional Mel-Frequency Cepstral Coefficients를 이용한 유해 오디오 인식 김명종; 유주홍; 김인수; 김회린, 대한전자공학회 2010년 하계종합학술대회, v.33, no.1, pp.16 - 17, 대한전자공학회, 2010-06 |
Segmental-feature HMM using parametric trajectory model Yun, YS; Oh, Yung-Hwan, 2000 IEEE Interntional Conference on Acoustics, Speech, and Signal Processing, v.3, pp.1249 - 1252, 2000-06-05 |
Discover