Browse by Title 

Showing results 174561 to 174580 of 278050

174561
Secure I/O architecture for isolated heterogeneous computing with hardware assisted trusted execution environment = 신뢰할 수 있는 이종 컴퓨팅을 위한 하드웨어 보안 기술 기반 안전한 I/O 아키텍처 연구link

Jang, Insu; Huh, Jaehyuk; et al, 한국과학기술원, 2018

174562
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20

174563
Secure In-memory Key-Value Storage with SGX

Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10

174564
Secure Inter-Container Communications Using XDP/eBPF

Nam, Jaehyun; Lee, Seungsoo; Porras, Phillip; Yegneswaran, Vinod; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947, 2023-04

174565
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

174566
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000

174567
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

174568
Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

174569
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

174570
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

174571
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

174572
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

174573
Secure mobile agent using strong non-designated proxy signature

Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07

174574
Secure mobile device structure and application = 안전한 모바일 기기의 구조 및 응용에 관한 연구link

Lee, Yun-kyung; Yoon, Hyun-Soo; et al, 한국과학기술원, 2018

174575
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

174576
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

Lee, Younho; Kim, Pyung; Park, Yongsu, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18, 2016

174577
Secure one snapshot protocol for concurrency control in real-time stock trading systems

Kim, N; Moon, Songchun; Sohn, Y, JOURNAL OF SYSTEMS AND SOFTWARE, v.73, no.3, pp.441 - 454, 2004-11

174578
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

174579
Secure Personal Content Networking over Untrusted Devices

Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02

174580
Secure quantum communication by preserving an optimal measurement

Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29

rss_1.0 rss_2.0 atom_1.0