Showing results 33841 to 33860 of 51620
Secure Clustered Distributed Storage Against Eavesdropping Choi, Beongjun; Sohn, Jy-Yong; Yoon, Sung Whan; Moon, Jaekyun, IEEE TRANSACTIONS ON INFORMATION THEORY, v.65, no.11, pp.7646 - 7668, 2019-11 |
Secure Code Design for Near Field Communications Yun,Sangseok; Baek, Jinho; Im, Sanghun; Ha, Jeongseok, International Conference on ICT Convergence 2014(ICTC 2014), IEEE, 2014-10-23 |
Secure Communication Using Anti-correlated Noise Hwang, Il-Pyeong; Lee, Chang-Hee, Asia Communications and Photonics Conference, Asia Communications and Photonics Conference, 2017-11-12 |
Secure Communication using Anti-correlated Noise from an ASE-Injected F-P LD Hwang, Il-Pyeong; Kye, Myeonggyun; Lee, Chang-Hee, 23rd Opto-Electronics and Communications Conference (OECC), pp.5D1-2 - 5D1-2, IEEE, 2018-07-05 |
Secure communication using non-systematic error control codes Steven William McLaughlin; Demijan Klinc; Ha Jeongseok, 2014-03-04 |
Secure Communication With Outdated Channel State Information via Untrusted Relay Capable of Energy Harvesting Lim, Jin-Taek; Lee, Kisong; Han, Youngnam, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.69, no.10, pp.11323 - 11337, 2020-10 |
Secure Communications with a Full-Duplex Relay Network under Residual Self-Interference Park, Junguk; Yun, Sangseok; Kim, Il-Min; Ha, Jeongseok, IEEE COMMUNICATIONS LETTERS, v.24, no.3, pp.496 - 500, 2020-03 |
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks Jeon, Hyoungsuk; McLaughlin, Steven W.; Kim, Il-Min; Ha, Jeongseok, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.13, no.4, pp.1790 - 1805, 2014-04 |
Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks Ha, Jeongseok; Jeon, Hyoungsuk; McLaughlin, Steven W., IEEE GLOBECOM, IEEE, 2012-12-05 |
Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel Lee, Si-Hyeon; Zhao, Wanyao; Khisti, Ashish, IEEE TRANSACTIONS ON INFORMATION THEORY, v.63, no.1, pp.496 - 508, 2017-01 |
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; Kim, Myungsun; Kim, Yongdae, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11 |
Secure Full-Duplex Relay Network using Cooperative Jamming Park, Jung Uk; Yun, Sangseok; Ha, Jeongseok, International Conference on Information and Communication Technology Convergence (ICTC), pp.885 - 887, KICS, 2017-10-18 |
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04 |
Secure group communication using robust contributory key agreement Amir, Y; Kim, Yongdae; Nita-Rotaru, C; Schultz, JL; Stanton, J; Tsudik, G, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.15, no.5, pp.468 - 480, 2004-05 |
Secure group key management for storage area networks Kim, Yongdae; Maino, F; Narasimha, M; Rhee, KH; Tsudik, G, IEEE COMMUNICATIONS MAGAZINE, v.41, no.8, pp.92 - 99, 2003-08 |
Secure Group Services for Storage Area Networks Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12 |
Secure Inter-Container Communications Using XDP/eBPF Nam, Jaehyun; Lee, Seungsoo; Porras, Phillip; Yegneswaran, Vinod; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947, 2023-04 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Secure localization with phantom node detection Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09 |
Secure Power Control for Downlink Cell-Free Massive MIMO With Passive Eavesdroppers Park, Junguk; Yun, Sangseok; Ha, Jeongseok, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.73, no.6, pp.9038 - 9043, 2024-06 |
Discover