Showing results 173001 to 173020 of 275604
Security of Lu et al.'s proxy-protected signature scheme Park, JH; Kang, Bo Gyeong, APPLIED MATHEMATICS AND COMPUTATION, v.169, no.2, pp.1010 - 1015, 2005-10 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
Security of the Misty Structure beyond the Birthday Bound Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07 |
Security of the Misty Structure Using Involutions as Round Functions Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09 |
Security of truncated random permutations = 절단된 임의치환의 안전성link Choi, Wonseok; Hahn, Sanggeun; 한상근; Lee, Jooyoung; et al, 한국과학기술원, 2018 |
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08 |
Security practices and regulatory compliance in the healthcare industry Kwon, Juhee; Johnson, M. Eric, JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, v.20, no.1, pp.44 - 51, 2013-01 |
Security threats to Internet: a Korean multi-industry investigation Jung, B; Han, Ingoo; Lee, S, INFORMATION MANAGEMENT, v.38, no.8, pp.487 - 498, 2001-10 |
Security Trading Rule Synthesis: A Syntactic Pattern-Based Learning Approach Jhee, Won C; Lee, Kun C; Lee, Jae Kyu, HEURISTICS, v.5, no.4, pp.47 - 61, 1992 |
Security use of bilayer dichroic films made of liquid crystal polymer networks Park, Geonhyeong; Yoon, Dong Ki, JOURNAL OF INFORMATION DISPLAY, v.22, no.3, pp.173 - 178, 2021-07 |
Security use of the chiral photonic film made of helical liquid crystal structures Park, Wongi; Ha, Taewoo; Jung, Taek Sun; Sim, Kyung Ik; Kim, Jae Hoon; Wolska, Joanna M.; Pociecha, Damian; et al, NANOSCALE, v.12, no.42, pp.21629 - 21634, 2020-11 |
Security vulnerability in Processor-Interconnect Router Design wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11 |
Security-enhanced cloud VPN with SGX and enclave migration = SGX를 이용한 클라우드 가상사설망의 보안 강화 및 Enclave 마이그레이션 기법 연구link Park, Jaemin; Kim, Kwangjo; et al, 한국과학기술원, 2019 |
Sediment characteristics and its impacts to water column in Han-river, Seoul, Korea Cho, Gye-Chun; Gil, K.I.; Kang, J.; Kim, L.H., 10th International Conferece on Urban Drainage, 2005-08 |
SEDRIS STF 데이터의 검증을 위한 변환 및 가시화 한순흥, 한국 시뮬레이션 학회 10' 춘계학술대회, 한국 시뮬레이션 학회, 2010-05-28 |
SEDRIS Transmittal Storing and Retrieval System using Relational Databases Kim, Yong Kwon; Yang, Hee Jung; Chung, Chin Wan, JOURNAL OF DATABASE MANAGEMENT, v.25, no.4, pp.38 - 65, 2014-10 |
SEDRIS 기반의 국방 모의체계 합성환경 데이터베이스의 상호운용성 = Interoperability of synthetic environment database in defense simulation system based on SEDRISlink 김형기; Kim, Hyung-Ki; et al, 한국과학기술원, 2011 |
SEDRIS 합성 환경 데이터 가시화를 위한 변환기 개발 강윤아; 김형기; 한순흥; 김만규, 한국CAD/CAM학회 논문집, v.18, no.3, pp.189 - 199, 2013-06 |
SEDRIS 합성환경 데이터 가시화를 위한 변환기 개발 강윤아; 김형기; 한순흥; 김만규, 2012 한국 CAD/CAM 학회 하계 학술대회, 한국 CAD/CAM 학회, 2012-08-23 |
SEDRIS기반의 모의자료 표현 표준화 김형기; 강윤아; 한순흥, 한국시뮬레이션학회 논문지, v.19, no.4, pp.249 - 259, 2010-12 |
Discover