Browse by Title 

Showing results 172961 to 172980 of 275510

172961
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR

김문철; 헨드리; 송영주; 정기호, 2012-10-31

172962
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR

Kim, Munchurl; HENDRY, Hendry; SONG, Young-Joo; JUNG, Ki-Ho

172963
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

172964
Security notions for the random oracle model in classical and quantum settings

Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25

172965
Security of a multisignature scheme for specified group of verifiers

Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07

172966
Security of consensus algorithm for stellar blockchain = 스텔라 블록체인 합의 알고리즘 보안성 분석link

Kim, Minjeong; Kim, Yongdae; et al, 한국과학기술원, 2020

172967
Security of Lu et al.'s proxy-protected signature scheme

Park, JH; Kang, Bo Gyeong, APPLIED MATHEMATICS AND COMPUTATION, v.169, no.2, pp.1010 - 1015, 2005-10

172968
Security of permutation-based compression function lp231

Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

172969
Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

172970
Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

172971
Security of truncated random permutations = 절단된 임의치환의 안전성link

Choi, Wonseok; Hahn, Sanggeun; 한상근; Lee, Jooyoung; et al, 한국과학기술원, 2018

172972
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks

Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08

172973
Security practices and regulatory compliance in the healthcare industry

Kwon, Juhee; Johnson, M. Eric, JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, v.20, no.1, pp.44 - 51, 2013-01

172974
Security threats to Internet: a Korean multi-industry investigation

Jung, B; Han, Ingoo; Lee, S, INFORMATION MANAGEMENT, v.38, no.8, pp.487 - 498, 2001-10

172975
Security Trading Rule Synthesis: A Syntactic Pattern-Based Learning Approach

Jhee, Won C; Lee, Kun C; Lee, Jae Kyu, HEURISTICS, v.5, no.4, pp.47 - 61, 1992

172976
Security use of bilayer dichroic films made of liquid crystal polymer networks

Park, Geonhyeong; Yoon, Dong Ki, JOURNAL OF INFORMATION DISPLAY, v.22, no.3, pp.173 - 178, 2021-07

172977
Security use of the chiral photonic film made of helical liquid crystal structures

Park, Wongi; Ha, Taewoo; Jung, Taek Sun; Sim, Kyung Ik; Kim, Jae Hoon; Wolska, Joanna M.; Pociecha, Damian; et al, NANOSCALE, v.12, no.42, pp.21629 - 21634, 2020-11

172978
Security vulnerability in Processor-Interconnect Router Design

wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11

172979
Security-enhanced cloud VPN with SGX and enclave migration = SGX를 이용한 클라우드 가상사설망의 보안 강화 및 Enclave 마이그레이션 기법 연구link

Park, Jaemin; Kim, Kwangjo; et al, 한국과학기술원, 2019

172980
Sediment characteristics and its impacts to water column in Han-river, Seoul, Korea

Cho, Gye-Chun; Gil, K.I.; Kang, J.; Kim, L.H., 10th International Conferece on Urban Drainage, 2005-08

rss_1.0 rss_2.0 atom_1.0