Showing results 1 to 12 of 12
A Secure Middlebox Framework for Enabling Visibility Over Multiple Encryption Protocols Han, Juhyeng; Kim, Seongmin; Cho, Daeyang; Choi, Byungkwon; Ha, Jaehyeong; Han, Dongsu, IEEE-ACM TRANSACTIONS ON NETWORKING, v.28, no.6, pp.2727 - 2740, 2020-12 |
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks Seol, Hoseok; Kim, Minhye; Kim, Taesoo; Kim, Yongdae; Kim, Lee-Sup, IEEE TRANSACTIONS ON COMPUTERS, v.70, no.4, pp.539 - 551, 2021-04 |
Concealable Oscillation-Based Physical Unclonable Function with a Single-Transistor Latch Jung, Jin-Woo; Han, Joon-Kyu; Yu, Ji-Man; Lee, Mun-Woo; Kim, Moon-Seok; Lee, Geon-Beom; Yun, Seong-Yun; et al, IEEE ELECTRON DEVICE LETTERS, v.43, no.8, pp.1359 - 1362, 2022-08 |
Cross-Layer Encryption of CFB-AES-TURBO for Advanced Satellite Data Transmission Security Jeon, Suhyeon; Kwak, Jeongho; Choi, Jihwan P., IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, v.58, no.3, pp.2192 - 2205, 2022-06 |
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption Lee, Kwangsu, IEEE ACCESS, v.11, pp.52636 - 52652, 2023 |
Design and Implementation of Secure Cryptographic System on Chip for Internet of Things Lee, Bongsoo; Lee, Il-Gu; Kim, Myungchul, IEEE ACCESS, v.10, pp.18730 - 18742, 2022-02 |
Masta: An HE-Friendly Cipher Using Modular Arithmetic Ha, Jincheol; Kim, Seongkwang; Choi, Wonseok; Lee, Jooyoung; Moon, Dukjae; Yoon, Hyojin; Cho, Jihoon, IEEE ACCESS, v.8, pp.194741 - 194751, 2020-10 |
Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey Tanuwidjaja, Harry Chandra; Choi, Rakyong; Baek, Seunggeun; Kim, Kwangjo, IEEE ACCESS, v.8, pp.167425 - 167447, 2020-09 |
Providing Receipt-freeness in Mixnet-based Voting Protocols Lee, Byoungcheon; Boyd, Colin; Dawson, Ed; Kim, Kwangjo, 2011-05-04 |
Table Redundancy Method for Protecting Against Fault Attacks Lee, Seungkwang; Jho, Nam-su; Kim, Myung-Chul, IEEE ACCESS, v.9, pp.92214 - 92223, 2021-07 |
이종의 통신망 간에 VoIP 미디어 암호화를 위한 RTP(Real-time Transport Protocol)의 재설계 및 성능 분석 오형준; 박재경; 원유헌, 한국컴퓨터정보학회논문지, v.18, no.4, pp.87 - 96, 2013-04 |
질의-인식 복호화를 사용한암호화된 XML 데이타에 대한 안전한 질의 처리 이재길; 황규영, 정보과학회논문지 : 데이타베이스, v.32, no.3, pp.243 - 253, 2005-06 |
Discover