Browse by Title 

Showing results 172801 to 172820 of 275279

172801
SecureCore: A Multicore based Intrusion Detection Architecture for Realtime Embedded Systems

Yoon, Man-Ki; Sha, Lui; Choi, Jaesik; Kim, Jung-Eun; Mohan, Sibin, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, pp.21 - 32, IEEE Computer Society, 2013-04-09

172802
Secured radio communication based on fusion of cryptography algorithms

Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01

172803
SecureLinQ: Joint Precoding and Scheduling for Secure Device-to-Device Networks

Choi, Jinseok; Park, Jeonghun, IEEE WIRELESS COMMUNICATIONS LETTERS, v.9, no.12, pp.2078 - 2082, 2020-12

172804
Securely executing malicious code = 악성코드의 안전한 실행에 대하여link

Faerevaag, Markus Veie; Cha, Sang Kil; 차상길; Kang, Brent Byung Hoon; et al, 한국과학기술원, 2019

172805
Securing a communication channel for the trusted execution environment

Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

172806
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

172807
Securing Database on Controlling Transactions in Multilevel Secure Databases

Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01

172808
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

172809
Securing design checking service for the regulation-based product design

Kim, Ikjune; Lee, Jaechul; Mun, Duhwan; Jun, Hongbae; Hwang, Jinsang; Kim, Jeong Tae; Han, Soonhung, COMPUTERS IN INDUSTRY, v.63, no.6, pp.586 - 596, 2012-08

172810
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

172811
Securing HB+ against GRS Man-in-the-Middle Attack

Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

172812
Securing legacy kernel with type-guided refactoring to rust = 러스트에서 타입 기반 리팩토링을 통한 기존 커널 보호link

Park, Sanguk; Ryu, Sukyoung; et al, 한국과학기술원, 2021

172813
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

172814
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

172815
Securing networked systems by protocol dialecting methods = 프로토콜 방언 기법을 이용한 네트워크 시스템 보안link

Noh, Jiseong; Kang, Brent Byunghoon; 강병훈; Shin, Seungwon; et al, 한국과학기술원, 2019

172816
Securing software-defined WAN through analyzing network attack surfaces = 네트워크 공격 표면 분석을 통한 소프트웨어 정의 WAN 보안성 향상에 관한 연구link

Kim, Jinwoo; Shin, Seungwon; et al, 한국과학기술원, 2022

172817
Securing Web Service by Automatic Robot Detection

Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02

172818
Security analysis of an ID-based key agreement for peer group communication

Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11

172819
Security analysis of end-to-end encryption in Telegram

Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26

172820
Security analysis of FHSS-based drone controller = 주파수 도약식 드론 조종기의 보안성 분석link

SHIN, HOCHEOL; 신호철; et al, 한국과학기술원, 2015

rss_1.0 rss_2.0 atom_1.0