Showing results 71381 to 71400 of 100643
Secretory production of human leptin in Escherichia coli Jeong, Kijun; Lee, SangYup, BIOTECHNOLOGY AND BIOENGINEERING, v.67, no.4, pp.398 - 407, 2000-02 |
Secretory production of recombinant protein by a high cell density culture of a protease negative mutant Escherichia coli strain Park, SJ; Georgiou, G; Lee, SangYup, BIOTECHNOLOGY PROGRESS, v.15, no.2, pp.164 - 167, 1999-03 |
Secretory production of spider silk proteins in metabolically engineered Corynebacterium glutamicum for spinning into tough fibers Jin, Qing; Pan, Fang; Hu, Chun-Fei; Lee, Sang Yup; Xia, Xiao-Xia; Qian, Zhi-Gang, METABOLIC ENGINEERING, v.70, pp.102 - 114, 2022-03 |
Secretory production of therapeutic proteins in Escherichia coli Lee, Sang Yup; Choi, Jong Hyun; Lee, Sang Jun, METHODS IN MOLECULAR BIOLOGY (CLIFTON, v.308, pp.31 - 42, 2005 |
Sectional Information-Based Collision Warning System Using Roadside Unit Aggregated Connected-Vehicle Information for a Cooperative Intelligent Transport System![]() Tak, Sehyun; Yoon, Jinsu; Woo, Soomin; Yeo, Hwasoo, JOURNAL OF ADVANCED TRANSPORTATION, v.2020, 2020-07 |
SectorGSnet: Sector Learning for Efficient Ground Segmentation of Outdoor LiDAR Point Clouds He, Dong; Abid, Furqan; Kim, Young-Min; Kim, Jong-Hwan, IEEE ACCESS, v.10, pp.11938 - 11946, 2022 |
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage Koo, Dong-Young; Hur, Jun-Beom; Yoon, Hyun-Soo, COMPUTERS & ELECTRICAL ENGINEERING, v.39, no.1, pp.34 - 46, 2013-01 |
Secure and efficient public key management in next generation mobile networks Han, Kyusuk; Mun, Hyeran; Shon, Taeshik; Yeun, Chan Yeob; Park, James J. (Jong Hyuk), PERSONAL AND UBIQUITOUS COMPUTING, v.16, no.6, pp.677 - 685, 2012-08 |
Secure authenticated group key agreement protocol in the MANET environment Yeun C.Y.; Han K.; Vo D.L.; Kim, Kwangjo, INFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164, 2008-08 |
Secure Bit-Plane Based Steganography for Secret Communication Bui, Cong-Nguyen; Lee, Hae-Yeoun; Joo, Jeong-Chun; Lee, Heung-Kyu, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.79 - 86, 2010-01 |
Secure Clustered Distributed Storage Against Eavesdropping Choi, Beongjun; Sohn, Jy-Yong; Yoon, Sung Whan; Moon, Jaekyun, IEEE TRANSACTIONS ON INFORMATION THEORY, v.65, no.11, pp.7646 - 7668, 2019-11 |
Secure Communication With Outdated Channel State Information via Untrusted Relay Capable of Energy Harvesting Lim, Jin-Taek; Lee, Kisong; Han, Youngnam, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.69, no.10, pp.11323 - 11337, 2020-10 |
Secure Communications with a Full-Duplex Relay Network under Residual Self-Interference Park, Junguk; Yun, Sangseok; Kim, Il-Min; Ha, Jeongseok, IEEE COMMUNICATIONS LETTERS, v.24, no.3, pp.496 - 500, 2020-03 |
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks Jeon, Hyoungsuk; McLaughlin, Steven W.; Kim, Il-Min; Ha, Jeongseok, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.13, no.4, pp.1790 - 1805, 2014-04 |
Secure Consolidated Authorization Mechanism for Supply Chain Management Seung-Phil Hong; Gail-joon Ahn; Kim, Myungchul, INTERNATIONAL JOURNAL OF COMPUTER AND INFORMATION SCIENCE, v.4, no.0, pp.0 - 0, 2003-01 |
Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel Lee, Si-Hyeon; Zhao, Wanyao; Khisti, Ashish, IEEE TRANSACTIONS ON INFORMATION THEORY, v.63, no.1, pp.496 - 508, 2017-01 |
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; Kim, Myungsun; Kim, Yongdae, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11 |
Secure group communication using robust contributory key agreement Amir, Y; Kim, Yongdae; Nita-Rotaru, C; Schultz, JL; Stanton, J; Tsudik, G, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.15, no.5, pp.468 - 480, 2004-05 |
Secure group communication with low communication complexity Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004 |
Secure Group Communication with Low Communication Complexity Kim, Heeyoul; Lee, Jaewon; Yoon, hyunsoo, Lecture Notes in Computer Science, Volume 3320/2005, 586-590, 2004-12 |
Discover