Browse "College of Engineering(공과대학)" by Type Conference

Showing results 61201 to 61260 of 90956

61201
Secretory Production of Recombinant proteins by High Cell Density Culture of Recombinant Escherichia coli using the the Bacillus sp. Endozylanase Signal Sequence

Choi, J.H; Lee, SangYup, The 12th Daejeon/Chungnam-Kyushu Symposium on Chemical Engineering, pp.129 - 130, Daejeon/Chungnam-Kyushu Symposium on Chemical Engineering, 1999

61202
Secretory production of recombinant proteins in E. coli employing new signal sequences and folding catalysts

Lee, SangYup, Annual Meeting of Korean Society for Biotechnology and Bioengineering, Korean Society for Biotechnology and Bioengineering, 2000-11

61203
Secretory Production of recombinant proteins using an artificial signal sequence

Lee, SangYup; Choi, Jong Hyun, Biochemical Engineering XI, Biochemical Engineering XI, 1999-07

61204
Section Shape Optimization of Concrete Box Girder Using a Modified Evolutionary Structural Optimization

최창근, Proceedings of Conference of Korea Society of Civil Engineers, in CD-ROM, 2001

61205
Sectional analysis of learning on the KAIST-Ewha colonoscopy Simulation II

Yi, S.Y.; Ryu, K.H.; Woo, H.S.; Ahn, W.; Kim, W.S.; Jung, H.; Cho, J.H.; et al, Medicine Meet Virtual Reality 17, v.142, pp.432 - 434, 2009-01-19

61206
Sector log: Fine-grained storage management for solid state drives

Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21

61207
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage

Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01

61208
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature

Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005

61209
Secure Antenna Subset Modulation with Coordinate Interleaved Orthogonal Designs

Hong, Youngpyo; Im, Sanghun; Ha, Jeongseok, International Conference on ICT Convergence 2014 (ICTC 2014), IEEE, 2014-10-22

61210
Secure Approach to Deploy RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12

61211
Secure Beamforming and Self-Energy Recycling with Full-Duplex Wireless-Powered Relay

Kim, Hongjun; Kang, Jinkyu; Jeong, Seongah; Lee, Kwang Eog; Kang, Joon Hyuk, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.662 - 667, IEEE, 2016-01-11

61212
Secure Clustered Distributed Storage Against Eavesdroppers

Choi, Beongjun; Sohn, Jy Yong; Yoon, Sung Whan; Moon, Jaekyun, 2017 IEEE International Conference on Communications, ICC 2017, Institute of Electrical and Electronics Engineers Inc., 2017-05-24

61213
Secure Code Design for Near Field Communications

Yun,Sangseok; Baek, Jinho; Im, Sanghun; Ha, Jeongseok, International Conference on ICT Convergence 2014(ICTC 2014), IEEE, 2014-10-23

61214
Secure Communication Using Anti-correlated Noise

Hwang, Il-Pyeong; Lee, Chang-Hee, Asia Communications and Photonics Conference, Asia Communications and Photonics Conference, 2017-11-12

61215
Secure Communication using Anti-correlated Noise from an ASE-Injected F-P LD

Hwang, Il-Pyeong; Kye, Myeonggyun; Lee, Chang-Hee, 23rd Opto-Electronics and Communications Conference (OECC), pp.5D1-2 - 5D1-2, IEEE, 2018-07-05

61216
Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks

Ha, Jeongseok; Jeon, Hyoungsuk; McLaughlin, Steven W., IEEE GLOBECOM, IEEE, 2012-12-05

61217
Secure Consolidated Authorization Mechanism for Supply Chain Management

Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001

61218
Secure Full-Duplex Relay Network using Cooperative Jamming

Park, Jung Uk; Yun, Sangseok; Ha, Jeongseok, International Conference on Information and Communication Technology Convergence (ICTC), pp.885 - 887, KICS, 2017-10-18

61219
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments

Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04

61220
Secure group communication with multiplicative one-way functions

Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04

61221
Secure Group Services for Storage Area Networks

Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12

61222
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20

61223
Secure In-memory Key-Value Storage with SGX

Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10

61224
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

61225
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

61226
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

61227
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

61228
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

61229
Secure quantum communication by preserving an optimal measurement

Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29

61230
Secure Remote Desktop with Necklace-Type Security Device

Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10

61231
Secure Storage Service for IaaS Cloud Users

Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14

61232
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI

Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04

61233
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems

Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11

61234
Secure Type-Based Muliple Access with Power Control

황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05

61235
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy

Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12

61236
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy

Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30

61237
Secure UAV Communications with Transmit-array Antenna

Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27

61238
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks

Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27

61239
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications

Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06

61240
Secured radio communication based on fusion of cryptography algorithms

Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01

61241
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

61242
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

61243
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

61244
Securing HB+ against GRS Man-in-the-Middle Attack

Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

61245
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

61246
Securing Web Service by Automatic Robot Detection

Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02

61247
Security analysis of end-to-end encryption in Telegram

Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26

61248
Security Analysis of FHSS-type Drone Controller

Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21

61249
Security analysis of quantum key distribution on passive optical networks

Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05

61250
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem

Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09

61251
Security and Privacy on Authentication Protocol for Low-cost RFID

Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01

61252
Security and Safeguard of Small Modular Reactors: Assessing Potential Risk for SMR Deployment in Southeast Asia

Prawira, Andhika Yudha; Yasmine, Hanna; Yim, Man-Sung, 2023 INMM & ESARDA Joint Annual Meeting, Institute of Nuclear Materials Management (INMM) and ESARDA, 2023-05-23

61253
Security Associations based Load Distribution among Parallel VPN servers

Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003

61254
Security Challenges for the Ubiquitous Society

윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20

61255
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network

Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25

61256
Security considerations for handover schemes in mobile WiMAX networks

Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31

61257
Security enhancement in ad hoc network with ID-based cryptosystem

Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21

61258
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC

Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18

61259
Security for RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

61260
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

rss_1.0 rss_2.0 atom_1.0