Results 1-5 of 5 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Untraceable Mobile Node Authentication in WSN Han, K; Kim, Kwangjo; Shon, T, SENSORS, v.10, no.5, pp.4410 - 4429, 2010-05 | |
Advances in Security Research in the Asiacrypt Region Phan, Raphael C. W.; Abe, Masayuki; Batten, Lynn; Cheon, Jung Hee; Dawson, E. D.; Galbraith, Steven; Guo, Jian; Hui, Lucas; Kim, Kwangjo; Lai, Xuejia; Lee, Dong Hoon; Matsui, Mitsuru; Matsumoto, Tsutomu; Moriai, Shiho; Phong Nguyen; Pei, Dingyi; Phan, Duong Hieu; Pieprzyk, Josef; Wang, Huaxiong; Wolfe, Hank; Wong, Duncan; Wu, Tzong-Chen; Yang, Bo-Yin; Yiu, Siu-Ming; Yu, Yu; Zhou, Jianying, COMMUNICATIONS OF THE ACM, v.64, no.4, pp.78 - 81, 2020-03 | |
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.7, pp.1433 - 1447, 2020-07 | |
Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey Tanuwidjaja, Harry Chandra; Choi, Rakyong; Baek, Seunggeun; Kim, Kwangjo, IEEE ACCESS, v.8, pp.167425 - 167447, 2020-09 | |
A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures Opare, Edwin Ayisi; Kim, Kwangjo, IEEE ACCESS, v.8, pp.110810 - 110847, 2020-06 |
Discover