Hong, Jaemin; Shim, Sunghwan; Park, Sanguk; Kim, Tae Woo; Kim, Jungwoo; Lee, Junsoo; Ryu, Sukyoung; Kang, Jeehoon, SCIENCE OF COMPUTER PROGRAMMING, v.238, 2024-12
Jeong, Hoyong; Chung, Kiwon; Hwang, Sung Ju; Son, Sooel, COMPUTERS SECURITY, v.144, 2024-09
Jung, Gyuwon; Park, Sangjun; Ma, Eun-Yeol; Kim, Heeyoung; Lee, Uichin, ACM COMPUTING SURVEYS, v.56, no.9, 2024-09
Kim, Minsu; Hwang, Jinwoo; Heo, Guseul; Cho, Seiyeon; Mahajan, Divya; Park, Jongse, PROCEEDINGS OF THE VLDB ENDOWMENT, v.17, no.8, pp.1802 - 1815, 2024-08
HA, TAEWOOK; Kim, Myoung Ho, 정보과학회 컴퓨팅의 실제 논문지, v.30, no.8, pp.347 - 353, 2024-08
Wang, Pei; Zhu, Yu; Xue, Danna; Yan, Qingsen; Sun, Jinqiu; Yoon, Sung-Eui; Zhang, Yanning, COMPUTER VISION AND IMAGE UNDERSTANDING, v.245, 2024-08
Yi, Shinyoung; Kim, Donggun; Na, Jiwoong; Tong, Xin; Kim, Min Hyuk, ACM Transactions on Graphics, v.43, no.4, 2024-07
Son, Sunmin; Jung, Jingun; Ham, Auejin; Lee, Geehyuk, INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, v.40, no.13, pp.3539 - 3551, 2024-07
Kim, Mincheul; Kwon, Youngsun; Lee, Sebin; Yoon, Sung-Eui, IEEE ROBOTICS AND AUTOMATION LETTERS, v.9, no.6, pp.5767 - 5774, 2024-06
Hwang, Soojin; Baek, Daehyeon; Park, Jongse; Huh, Jaehyuk, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.21, no.2, 2024-06
A novel privacy preserving authentication and access control scheme for pervasive computing environments Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07 |
An Efficient Anonymous AuthenticationProtocol in Vehicular Ad-hoc Networks Yim, Junhyun; Choi, Imsung; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24 |
Security analysis of an ID-based key agreement for peer group communication Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11 |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01 |
Adaptive bit-reduced mean absolute difference criterion for block-matching algorithm and its VLSI design Oh, HS; Baek, Y; Lee, Heung-Kyu, OPTICAL ENGINEERING, v.37, no.12, pp.3272 - 3281, 1998-12 |
WATERMARKING CURVES FOR FINGERPRINTING DIGITAL MAPS Im, Dong-Hyuck; Hu, Yongjian; Lee, Hae-Yeoun; Lee, Heung-Kyu, INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, v.6, pp.1257 - 1269, 2010-03 |
CIGMA: Active inventory service in global E-market based on efficient catalog management Kim, SM; Kang, SW; Lee, Heung-Kyu; Song, Junehwa, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, no.12, pp.2651 - 2663, 2005-12 |
Spread Spectrum Video Data Hiding, Interleaving and Synchronization Shi, Yun Q.; Huang, Jiwu; Lee, Heung-Kyu, Intelligent Watermarking Techniques, pp.515-558, 2004 |
Rotation-, scale-, and translation-invariant image watermark using higher order spectra Kim, HS; Baek, Y; Lee, Heung-Kyu, OPTICAL ENGINEERING, v.42, pp.340 - 349, 2003-02 |
Improved watermark synchronization based on local autocorrelation function Lee, Min-Jeong; Kim, Kyung-Su; Oh, Tae-Woo; Lee, Hae-Yeoun; Lee, Heung-Kyu, JOURNAL OF ELECTRONIC IMAGING, v.18, 2009-04 |
Supplementary loss concealment technique for image transmission through data hiding Kim, Kyung-Su; Lee, Hae-Yeoun; Lee, Heung-Kyu, MULTIMEDIA TOOLS AND APPLICATIONS, v.44, pp.1 - 16, 2009-08 |
MPEG-compliant joint source/channel coding using discrete cosine transform and substream scheduling for visual communication over packet networks Kim, SW; Suthaharan, S; Lee, Heung-Kyu; Rao, KR, JOURNAL OF ELECTRONIC IMAGING, v.10, no.1, pp.329 - 338, 2001-01 |
Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels Kim, Kyung-Su; Lee, Hae-yeoun; Lee, Heung-Kyu, Journal of Communications and Networks , Vol.12, No.3, pp.1-6, 2010-06 |
Developing Component Architecture for Telecommunication Systems Kim, Hyung Ho; Bae, Doo-Hwan; Keum, Chang-Sup; Lee, Byung-Sun, INTERNATIONAL JOURNAL OF COMPUTER & INFORMATION SCIENCE, v.2, no.4, pp.191 - 200, 2001-12 |
Electronic funds transfer protocol using domain-verifiable signcryption scheme Seo, Moonseog; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC99 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1787, pp.269 - 277, 2000-12 |
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation Song, Boyeon; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249, 2000-12 |
Secure MatchMaking Protocols Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12 |
Algebraic analysis of the topological properties of a banyan network and its application in fault-tolerant switching networks Park, JH; Lee, Heung-Kyu, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.66, pp.773 - 779, 2006-06 |
USING TERM DEPENDENCIES OF A THESAURUS IN THE FUZZY SET MODEL LEE, JH; Kim, Myoung Ho; CHO, YH, MICROPROCESSING AND MICROPROGRAMMING, v.39, no.2-5, pp.105 - 108, 1993-12 |
도메인 뷰포인트를 통한 소프트웨어 프로덕트 라인 아키텍처 설계방법들의 비교 안휘; 강성원; 김진규, 소프트웨어공학소사이어티 논문지, v.21, no.4, pp.107 - 210, 2008-12 |
Discover