Showing results 174601 to 174620 of 278050
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06 |
SecureCore: A Multicore based Intrusion Detection Architecture for Realtime Embedded Systems Yoon, Man-Ki; Sha, Lui; Choi, Jaesik; Kim, Jung-Eun; Mohan, Sibin, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, pp.21 - 32, IEEE Computer Society, 2013-04-09 |
Secured radio communication based on fusion of cryptography algorithms Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01 |
SecureLinQ: Joint Precoding and Scheduling for Secure Device-to-Device Networks Choi, Jinseok; Park, Jeonghun, IEEE WIRELESS COMMUNICATIONS LETTERS, v.9, no.12, pp.2078 - 2082, 2020-12 |
Securely executing malicious code = 악성코드의 안전한 실행에 대하여link Faerevaag, Markus Veie; Cha, Sang Kil; 차상길; Kang, Brent Byung Hoon; et al, 한국과학기술원, 2019 |
Securing a communication channel for the trusted execution environment Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06 |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 |
Securing Database on Controlling Transactions in Multilevel Secure Databases Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01 |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 |
Securing design checking service for the regulation-based product design Kim, Ikjune; Lee, Jaechul; Mun, Duhwan; Jun, Hongbae; Hwang, Jinsang; Kim, Jeong Tae; Han, Soonhung, COMPUTERS IN INDUSTRY, v.63, no.6, pp.586 - 596, 2012-08 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Securing legacy kernel with type-guided refactoring to rust = 러스트에서 타입 기반 리팩토링을 통한 기존 커널 보호link Park, Sanguk; Ryu, Sukyoung; et al, 한국과학기술원, 2021 |
Securing mobile agents by integrity-based encryption Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21 |
Securing mobile agents by integrity-based encryption Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09 |
Securing networked systems by protocol dialecting methods = 프로토콜 방언 기법을 이용한 네트워크 시스템 보안link Noh, Jiseong; Kang, Brent Byunghoon; 강병훈; Shin, Seungwon; et al, 한국과학기술원, 2019 |
Securing software-defined WAN through analyzing network attack surfaces = 네트워크 공격 표면 분석을 통한 소프트웨어 정의 WAN 보안성 향상에 관한 연구link Kim, Jinwoo; Shin, Seungwon; et al, 한국과학기술원, 2022 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security analysis of an ID-based key agreement for peer group communication Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11 |
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Discover