Browse by Type Article

Showing results 71421 to 71440 of 100643

71421
Securing Database on Controlling Transactions in Multilevel Secure Databases

Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01

71422
Securing design checking service for the regulation-based product design

Kim, Ikjune; Lee, Jaechul; Mun, Duhwan; Jun, Hongbae; Hwang, Jinsang; Kim, Jeong Tae; Han, Soonhung, COMPUTERS IN INDUSTRY, v.63, no.6, pp.586 - 596, 2012-08

71423
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

71424
Security analysis of an ID-based key agreement for peer group communication

Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11

71425
Security analysis of multi-path routing scheme in ad hoc networks

Jeong, JM; Ma, JoongSoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.694 - 697, 2004

71426
Security analysis of quantum key distribution on passive optical networks

Lim, Kyongchun; Ko, Heasin; Suh, Changho; Rhee, June-Koo Kevin, OPTICS EXPRESS, v.25, no.10, pp.11894 - 11909, 2017-05

71427
Security and performance in service-oriented applications: Trading off competing objectives

ZO, Hangjung; Nazareth, Derek L; Jain, Hemant K., DECISION SUPPORT SYSTEMS, v.50, pp.336 - 346, 2010-12

71428
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdae; Zhang, Yanchao, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

71429
Security Framework for RFID-based Applications in Smart Home Environment

Konidala, Divyan M.; Kim, Daeyoung; Yeun, Chan Yeob; Lee, Byoungcheon, JIPS(Journal of Information Processing Systems), v.7, no.1, pp.111 - 120, 2011-03

71430
Security in Automotive Radar and Vehicular Networks

Yeh, Enoch R.; Bhat, Chandra R.; Heath, Robert W., Jr.; Choi, Junil; Prelcic, Nuria G., MICROWAVE JOURNAL, v.60, no.5, pp.148 - 164, 2017-05

71431
Security of a multisignature scheme for specified group of verifiers

Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07

71432
Security of Lu et al.'s proxy-protected signature scheme

Park, JH; Kang, Bo Gyeong, APPLIED MATHEMATICS AND COMPUTATION, v.169, no.2, pp.1010 - 1015, 2005-10

71433
Security of permutation-based compression function lp231

Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

71434
Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

71435
Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

71436
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks

Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08

71437
Security practices and regulatory compliance in the healthcare industry

Kwon, Juhee; Johnson, M. Eric, JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, v.20, no.1, pp.44 - 51, 2013-01

71438
Security threats to Internet: a Korean multi-industry investigation

Jung, B; Han, Ingoo; Lee, S, INFORMATION MANAGEMENT, v.38, no.8, pp.487 - 498, 2001-10

71439
Security Trading Rule Synthesis: A Syntactic Pattern-Based Learning Approach

Jhee, Won C; Lee, Kun C; Lee, Jae Kyu, HEURISTICS, v.5, no.4, pp.47 - 61, 1992

71440
Security use of bilayer dichroic films made of liquid crystal polymer networks

Park, Geonhyeong; Yoon, Dong Ki, JOURNAL OF INFORMATION DISPLAY, v.22, no.3, pp.173 - 178, 2021-07

rss_1.0 rss_2.0 atom_1.0