Showing results 61201 to 61260 of 90956
Secretory Production of Recombinant proteins by High Cell Density Culture of Recombinant Escherichia coli using the the Bacillus sp. Endozylanase Signal Sequence Choi, J.H; Lee, SangYup, The 12th Daejeon/Chungnam-Kyushu Symposium on Chemical Engineering, pp.129 - 130, Daejeon/Chungnam-Kyushu Symposium on Chemical Engineering, 1999 |
Secretory production of recombinant proteins in E. coli employing new signal sequences and folding catalysts Lee, SangYup, Annual Meeting of Korean Society for Biotechnology and Bioengineering, Korean Society for Biotechnology and Bioengineering, 2000-11 |
Secretory Production of recombinant proteins using an artificial signal sequence Lee, SangYup; Choi, Jong Hyun, Biochemical Engineering XI, Biochemical Engineering XI, 1999-07 |
Section Shape Optimization of Concrete Box Girder Using a Modified Evolutionary Structural Optimization 최창근, Proceedings of Conference of Korea Society of Civil Engineers, in CD-ROM, 2001 |
Sectional analysis of learning on the KAIST-Ewha colonoscopy Simulation II Yi, S.Y.; Ryu, K.H.; Woo, H.S.; Ahn, W.; Kim, W.S.; Jung, H.; Cho, J.H.; et al, Medicine Meet Virtual Reality 17, v.142, pp.432 - 434, 2009-01-19 |
Sector log: Fine-grained storage management for solid state drives Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21 |
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01 |
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005 |
Secure Antenna Subset Modulation with Coordinate Interleaved Orthogonal Designs Hong, Youngpyo; Im, Sanghun; Ha, Jeongseok, International Conference on ICT Convergence 2014 (ICTC 2014), IEEE, 2014-10-22 |
Secure Approach to Deploy RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12 |
Secure Beamforming and Self-Energy Recycling with Full-Duplex Wireless-Powered Relay Kim, Hongjun; Kang, Jinkyu; Jeong, Seongah; Lee, Kwang Eog; Kang, Joon Hyuk, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.662 - 667, IEEE, 2016-01-11 |
Secure Clustered Distributed Storage Against Eavesdroppers Choi, Beongjun; Sohn, Jy Yong; Yoon, Sung Whan; Moon, Jaekyun, 2017 IEEE International Conference on Communications, ICC 2017, Institute of Electrical and Electronics Engineers Inc., 2017-05-24 |
Secure Code Design for Near Field Communications Yun,Sangseok; Baek, Jinho; Im, Sanghun; Ha, Jeongseok, International Conference on ICT Convergence 2014(ICTC 2014), IEEE, 2014-10-23 |
Secure Communication Using Anti-correlated Noise Hwang, Il-Pyeong; Lee, Chang-Hee, Asia Communications and Photonics Conference, Asia Communications and Photonics Conference, 2017-11-12 |
Secure Communication using Anti-correlated Noise from an ASE-Injected F-P LD Hwang, Il-Pyeong; Kye, Myeonggyun; Lee, Chang-Hee, 23rd Opto-Electronics and Communications Conference (OECC), pp.5D1-2 - 5D1-2, IEEE, 2018-07-05 |
Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks Ha, Jeongseok; Jeon, Hyoungsuk; McLaughlin, Steven W., IEEE GLOBECOM, IEEE, 2012-12-05 |
Secure Consolidated Authorization Mechanism for Supply Chain Management Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001 |
Secure Full-Duplex Relay Network using Cooperative Jamming Park, Jung Uk; Yun, Sangseok; Ha, Jeongseok, International Conference on Information and Communication Technology Convergence (ICTC), pp.885 - 887, KICS, 2017-10-18 |
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04 |
Secure group communication with multiplicative one-way functions Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04 |
Secure Group Services for Storage Area Networks Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12 |
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20 |
Secure In-memory Key-Value Storage with SGX Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Secure Many-to-many Multicast in Heterogenous Networks Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11 |
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06 |
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01 |
Secure quantum communication by preserving an optimal measurement Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29 |
Secure Remote Desktop with Necklace-Type Security Device Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10 |
Secure Storage Service for IaaS Cloud Users Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14 |
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04 |
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11 |
Secure Type-Based Muliple Access with Power Control 황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05 |
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12 |
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30 |
Secure UAV Communications with Transmit-array Antenna Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27 |
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27 |
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06 |
Secured radio communication based on fusion of cryptography algorithms Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01 |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Securing mobile agents by integrity-based encryption Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
Security and Privacy on Authentication Protocol for Low-cost RFID Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01 |
Security and Safeguard of Small Modular Reactors: Assessing Potential Risk for SMR Deployment in Southeast Asia Prawira, Andhika Yudha; Yasmine, Hanna; Yim, Man-Sung, 2023 INMM & ESARDA Joint Annual Meeting, Institute of Nuclear Materials Management (INMM) and ESARDA, 2023-05-23 |
Security Associations based Load Distribution among Parallel VPN servers Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Discover