Browse "College of Engineering(공과대학)" by Type Conference

Showing results 61201 to 61260 of 90929

61201
Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks

Ha, Jeongseok; Jeon, Hyoungsuk; McLaughlin, Steven W., IEEE GLOBECOM, IEEE, 2012-12-05

61202
Secure Consolidated Authorization Mechanism for Supply Chain Management

Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001

61203
Secure Full-Duplex Relay Network using Cooperative Jamming

Park, Jung Uk; Yun, Sangseok; Ha, Jeongseok, International Conference on Information and Communication Technology Convergence (ICTC), pp.885 - 887, KICS, 2017-10-18

61204
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments

Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04

61205
Secure group communication with multiplicative one-way functions

Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04

61206
Secure Group Services for Storage Area Networks

Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12

61207
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20

61208
Secure In-memory Key-Value Storage with SGX

Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10

61209
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

61210
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

61211
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

61212
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

61213
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

61214
Secure quantum communication by preserving an optimal measurement

Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29

61215
Secure Remote Desktop with Necklace-Type Security Device

Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10

61216
Secure Storage Service for IaaS Cloud Users

Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14

61217
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI

Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04

61218
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems

Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11

61219
Secure Type-Based Muliple Access with Power Control

황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05

61220
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy

Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12

61221
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy

Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30

61222
Secure UAV Communications with Transmit-array Antenna

Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27

61223
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks

Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27

61224
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications

Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06

61225
Secured radio communication based on fusion of cryptography algorithms

Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01

61226
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

61227
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

61228
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

61229
Securing HB+ against GRS Man-in-the-Middle Attack

Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

61230
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

61231
Securing Web Service by Automatic Robot Detection

Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02

61232
Security analysis of end-to-end encryption in Telegram

Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26

61233
Security Analysis of FHSS-type Drone Controller

Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21

61234
Security analysis of quantum key distribution on passive optical networks

Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05

61235
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem

Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09

61236
Security and Privacy on Authentication Protocol for Low-cost RFID

Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01

61237
Security and Safeguard of Small Modular Reactors: Assessing Potential Risk for SMR Deployment in Southeast Asia

Prawira, Andhika Yudha; Yasmine, Hanna; Yim, Man-Sung, 2023 INMM & ESARDA Joint Annual Meeting, Institute of Nuclear Materials Management (INMM) and ESARDA, 2023-05-23

61238
Security Associations based Load Distribution among Parallel VPN servers

Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003

61239
Security Challenges for the Ubiquitous Society

윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20

61240
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network

Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25

61241
Security considerations for handover schemes in mobile WiMAX networks

Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31

61242
Security enhancement in ad hoc network with ID-based cryptosystem

Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21

61243
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC

Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18

61244
Security for RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

61245
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

61246
Security notions for the random oracle model in classical and quantum settings

Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25

61247
Security vulnerability in Processor-Interconnect Router Design

wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11

61248
Sediment characteristics and its impacts to water column in Han-river, Seoul, Korea

Cho, Gye-Chun; Gil, K.I.; Kang, J.; Kim, L.H., 10th International Conferece on Urban Drainage, 2005-08

61249
SEDRIS STF 데이터의 검증을 위한 변환 및 가시화

한순흥, 한국 시뮬레이션 학회 10' 춘계학술대회, 한국 시뮬레이션 학회, 2010-05-28

61250
SEDRIS 합성환경 데이터 가시화를 위한 변환기 개발

강윤아; 김형기; 한순흥; 김만규, 2012 한국 CAD/CAM 학회 하계 학술대회, 한국 CAD/CAM 학회, 2012-08-23

61251
SEDRIS를 사용한 국방 모의체계 합성환경 데이터베이스 구축

한순흥; 김형기, 육군 M&S 학술대회, 2010-11-18

61252
SEDRIS를 활용한 실 환경 데이터의 합성환경

한순흥, 한국시뮬레이션학회 춘계학술대회, 한국시뮬레이션학회, 2011-05-28

61253
See Video : An Interactive Video-on-Demand System Supporting Reliable Streaming of Stored Files

Kang, SI; Song, Junehwa; Lee, Heung-Kyu, Proc. of ACIS Annual Int. Conf. on Computer and Information Science, IEEE, 2002-08

61254
See-through LCDs using transparent light-guide plates

Choi, W.-S.; Lee, J.-H.; Yeon, J.; Yoon, Jun-Bo, 15th International Display Workshops, IDW '08, pp.459 - 462, 2008-12-03

61255
Seed Grain 방법에 의한 저전압용 Varistor 의 제조에 관한 연구

Kim, Chong Hee, 한국요업학외, 1985

61256
Seed growing for interactive image segmentation with geodesic voting

Park, Sun Jeong; Lee, Han Sang; Kim, Junmo, 23rd IEEE International Conference on Image Processing (ICIP), IEEE Signal Processing Society, 2016-09

61257
Seed Layer를 이용한 PZT박막의 배향성 조절에 관한 연구

이원종; 강희수, 한국재료학회 춘계학술발표대회, pp.0 - 0, 2000-05-01

61258
Seed light 주입형 RSOA 기반 WDM PON의 외부반사에 대한 내성 분석

정윤철; 전현채; 조근영; Takushima, Y, 광자기술 학술회의, 2008

61259
Seed-Mediated Synthesis of Gold Nanorods and Surface Modification Based on Gold Binding Fusion Protein

Hong, Won-Hi; Park, WM; Park, TJ; Lee, SY, The 21st International Symposium On Chemical Engineering Kyushu/Daejeon-Chungnam, 2008

61260
Seeding ALD of high-k gate dielectric in CVD graphene FETs for enhanced device performance and reliability

Shin, Woo Cheol; Cho, Byung Jin, Graphene Week 2012, 2012-06

rss_1.0 rss_2.0 atom_1.0