Showing results 172981 to 173000 of 275604
Security and universality improvement for trusted execution environment = 신뢰 실행 환경의 보안성 및 범용성 향상link Jang, Jinsoo; Kang, Brent Byung Hoon; et al, 한국과학기술원, 2018 |
Security Associations based Load Distribution among Parallel VPN servers Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security Consideration in Ubiquitous Environments of the Project iWearCom Ko, Ki-Hyoung; An, Byunghee; Lee, Jang Won; Choi, Doo Ho; Han, Jae Woo, Next Generation PC 2005 International Conference, pp.79 - 85, 2005 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security considerations in processor interconnect design = 프로세서 인터커넥트 네트워크에서의 보안문제link Song, Won-Jun; 송원준; et al, 한국과학기술원, 2014 |
Security control and risk analysis under EC environment = 전자 상거래 환경에서의 보안 통제와 위험 분석link Suh, Bo-Mil; 서보밀; et al, 한국과학기술원, 2003 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security Evaluation of a CALS System Cha, Sungdeok, 제9회 화랑대 국제학술대회, pp.91 - 106, 1997 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security Framework for RFID-based Applications in Smart Home Environment Konidala, Divyan M.; Kim, Daeyoung; Yeun, Chan Yeob; Lee, Byoungcheon, JIPS(Journal of Information Processing Systems), v.7, no.1, pp.111 - 120, 2011-03 |
Security in Automotive Radar and Vehicular Networks Yeh, Enoch R.; Bhat, Chandra R.; Heath, Robert W., Jr.; Choi, Junil; Prelcic, Nuria G., MICROWAVE JOURNAL, v.60, no.5, pp.148 - 164, 2017-05 |
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR 김문철; 헨드리; 송영주; 정기호, 2012-10-31 |
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR Kim, Munchurl; HENDRY, Hendry; SONG, Young-Joo; JUNG, Ki-Ho |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Security notions for the random oracle model in classical and quantum settings Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
Security of a multisignature scheme for specified group of verifiers Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07 |
Security of consensus algorithm for stellar blockchain = 스텔라 블록체인 합의 알고리즘 보안성 분석link Kim, Minjeong; Kim, Yongdae; et al, 한국과학기술원, 2020 |
Discover