Showing results 174561 to 174580 of 278050
Secure I/O architecture for isolated heterogeneous computing with hardware assisted trusted execution environment = 신뢰할 수 있는 이종 컴퓨팅을 위한 하드웨어 보안 기술 기반 안전한 I/O 아키텍처 연구link Jang, Insu; Huh, Jaehyuk; et al, 한국과학기술원, 2018 |
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20 |
Secure In-memory Key-Value Storage with SGX Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10 |
Secure Inter-Container Communications Using XDP/eBPF Nam, Jaehyun; Lee, Seungsoo; Porras, Phillip; Yegneswaran, Vinod; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947, 2023-04 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Secure localization with phantom node detection Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09 |
Secure Many-to-Many Multicast in Heterogeneous Networks Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11 |
Secure Many-to-many Multicast in Heterogenous Networks Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11 |
Secure MatchMaking Protocols Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12 |
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06 |
Secure mobile agent using strong non-designated proxy signature Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07 |
Secure mobile device structure and application = 안전한 모바일 기기의 구조 및 응용에 관한 연구link Lee, Yun-kyung; Yoon, Hyun-Soo; et al, 한국과학기술원, 2018 |
Secure mobile device structure for trust IoT Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12 |
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud Lee, Younho; Kim, Pyung; Park, Yongsu, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18, 2016 |
Secure one snapshot protocol for concurrency control in real-time stock trading systems Kim, N; Moon, Songchun; Sohn, Y, JOURNAL OF SYSTEMS AND SOFTWARE, v.73, no.3, pp.441 - 454, 2004-11 |
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01 |
Secure Personal Content Networking over Untrusted Devices Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02 |
Secure quantum communication by preserving an optimal measurement Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29 |
Discover