Showing results 174581 to 174600 of 278078
Secure Group Communication with Low Communication Complexity Kim, Heeyoul; Lee, Jaewon; Yoon, hyunsoo, Lecture Notes in Computer Science, Volume 3320/2005, 586-590, 2004-12 |
Secure group communication with multiplicative one-way functions Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04 |
Secure group key distribution schemes for broadcast encryption = 브로드캐스트 암호를 위한 안전한 그룹키 분배 기법에 관한 연구link Park, Chan-Il; 박찬일; et al, 한국과학기술원, 2011 |
Secure group key management for storage area networks Kim, Yongdae; Maino, F; Narasimha, M; Rhee, KH; Tsudik, G, IEEE COMMUNICATIONS MAGAZINE, v.41, no.8, pp.92 - 99, 2003-08 |
Secure Group Services for Storage Area Networks Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12 |
Secure I/O architecture for isolated heterogeneous computing with hardware assisted trusted execution environment = 신뢰할 수 있는 이종 컴퓨팅을 위한 하드웨어 보안 기술 기반 안전한 I/O 아키텍처 연구link Jang, Insu; Huh, Jaehyuk; et al, 한국과학기술원, 2018 |
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20 |
Secure In-memory Key-Value Storage with SGX Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10 |
Secure Inter-Container Communications Using XDP/eBPF Nam, Jaehyun; Lee, Seungsoo; Porras, Phillip; Yegneswaran, Vinod; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947, 2023-04 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Secure localization with phantom node detection Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09 |
Secure Many-to-Many Multicast in Heterogeneous Networks Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11 |
Secure Many-to-many Multicast in Heterogenous Networks Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11 |
Secure MatchMaking Protocols Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12 |
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06 |
Secure mobile agent using strong non-designated proxy signature Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07 |
Secure mobile device structure and application = 안전한 모바일 기기의 구조 및 응용에 관한 연구link Lee, Yun-kyung; Yoon, Hyun-Soo; et al, 한국과학기술원, 2018 |
Secure mobile device structure for trust IoT Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12 |
Discover