CS-Journal Papers(저널논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 3541 to 3560 of 4065

3541
A novel privacy preserving authentication and access control scheme for pervasive computing environments

Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07

3542
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks

Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24

3543
Security analysis of an ID-based key agreement for peer group communication

Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11

3544
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01

3545
Adaptive bit-reduced mean absolute difference criterion for block-matching algorithm and its VLSI design

Oh, HS; Baek, Y; Lee, Heung-Kyu, OPTICAL ENGINEERING, v.37, no.12, pp.3272 - 3281, 1998-12

3546
WATERMARKING CURVES FOR FINGERPRINTING DIGITAL MAPS

Im, Dong-Hyuck; Hu, Yongjian; Lee, Hae-Yeoun; Lee, Heung-Kyu, INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, v.6, pp.1257 - 1269, 2010-03

3547
CIGMA: Active inventory service in global E-market based on efficient catalog management

Kim, SM; Kang, SW; Lee, Heung-Kyu; Song, Junehwa, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, no.12, pp.2651 - 2663, 2005-12

3548
Spread Spectrum Video Data Hiding, Interleaving and Synchronization

Shi, Yun Q.; Huang, Jiwu; Lee, Heung-Kyu, Intelligent Watermarking Techniques, pp.515-558, 2004

3549
Rotation-, scale-, and translation-invariant image watermark using higher order spectra

Kim, HS; Baek, Y; Lee, Heung-Kyu, OPTICAL ENGINEERING, v.42, pp.340 - 349, 2003-02

3550
Improved watermark synchronization based on local autocorrelation function

Lee, Min-Jeong; Kim, Kyung-Su; Oh, Tae-Woo; Lee, Hae-Yeoun; Lee, Heung-Kyu, JOURNAL OF ELECTRONIC IMAGING, v.18, 2009-04

3551
Supplementary loss concealment technique for image transmission through data hiding

Kim, Kyung-Su; Lee, Hae-Yeoun; Lee, Heung-Kyu, MULTIMEDIA TOOLS AND APPLICATIONS, v.44, pp.1 - 16, 2009-08

3552
MPEG-compliant joint source/channel coding using discrete cosine transform and substream scheduling for visual communication over packet networks

Kim, SW; Suthaharan, S; Lee, Heung-Kyu; Rao, KR, JOURNAL OF ELECTRONIC IMAGING, v.10, no.1, pp.329 - 338, 2001-01

3553
Spatial Error Concealment Technique for Losslessly  Compressed Images Using Data Hiding in Error-Prone Channels

Kim, Kyung-Su; Lee, Hae-yeoun; Lee, Heung-Kyu, Journal of Communications and Networks , Vol.12, No.3, pp.1-6, 2010-06

3554
Developing Component Architecture for Telecommunication Systems

Kim, Hyung Ho; Bae, Doo-Hwan; Keum, Chang-Sup; Lee, Byung-Sun, INTERNATIONAL JOURNAL OF COMPUTER & INFORMATION SCIENCE, v.2, no.4, pp.191 - 200, 2001-12

3555
Electronic funds transfer protocol using domain-verifiable signcryption scheme

Seo, Moonseog; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC99 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1787, pp.269 - 277, 2000-12

3556
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation

Song, Boyeon; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249, 2000-12

3557
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

3558
Algebraic analysis of the topological properties of a banyan network and its application in fault-tolerant switching networks

Park, JH; Lee, Heung-Kyu, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.66, pp.773 - 779, 2006-06

3559
USING TERM DEPENDENCIES OF A THESAURUS IN THE FUZZY SET MODEL

LEE, JH; Kim, Myoung Ho; CHO, YH, MICROPROCESSING AND MICROPROGRAMMING, v.39, no.2-5, pp.105 - 108, 1993-12

3560
도메인 뷰포인트를 통한 소프트웨어 프로덕트 라인 아키텍처 설계방법들의 비교

안휘; 강성원; 김진규, 소프트웨어공학소사이어티 논문지, v.21, no.4, pp.107 - 210, 2008-12

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0