Showing results 61201 to 61260 of 90929
Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks Ha, Jeongseok; Jeon, Hyoungsuk; McLaughlin, Steven W., IEEE GLOBECOM, IEEE, 2012-12-05 |
Secure Consolidated Authorization Mechanism for Supply Chain Management Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001 |
Secure Full-Duplex Relay Network using Cooperative Jamming Park, Jung Uk; Yun, Sangseok; Ha, Jeongseok, International Conference on Information and Communication Technology Convergence (ICTC), pp.885 - 887, KICS, 2017-10-18 |
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04 |
Secure group communication with multiplicative one-way functions Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04 |
Secure Group Services for Storage Area Networks Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12 |
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20 |
Secure In-memory Key-Value Storage with SGX Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Secure Many-to-many Multicast in Heterogenous Networks Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11 |
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06 |
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01 |
Secure quantum communication by preserving an optimal measurement Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29 |
Secure Remote Desktop with Necklace-Type Security Device Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10 |
Secure Storage Service for IaaS Cloud Users Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14 |
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04 |
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11 |
Secure Type-Based Muliple Access with Power Control 황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05 |
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12 |
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30 |
Secure UAV Communications with Transmit-array Antenna Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27 |
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27 |
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06 |
Secured radio communication based on fusion of cryptography algorithms Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01 |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Securing mobile agents by integrity-based encryption Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
Security and Privacy on Authentication Protocol for Low-cost RFID Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01 |
Security and Safeguard of Small Modular Reactors: Assessing Potential Risk for SMR Deployment in Southeast Asia Prawira, Andhika Yudha; Yasmine, Hanna; Yim, Man-Sung, 2023 INMM & ESARDA Joint Annual Meeting, Institute of Nuclear Materials Management (INMM) and ESARDA, 2023-05-23 |
Security Associations based Load Distribution among Parallel VPN servers Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Security notions for the random oracle model in classical and quantum settings Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
Security vulnerability in Processor-Interconnect Router Design wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11 |
Sediment characteristics and its impacts to water column in Han-river, Seoul, Korea Cho, Gye-Chun; Gil, K.I.; Kang, J.; Kim, L.H., 10th International Conferece on Urban Drainage, 2005-08 |
SEDRIS STF 데이터의 검증을 위한 변환 및 가시화 한순흥, 한국 시뮬레이션 학회 10' 춘계학술대회, 한국 시뮬레이션 학회, 2010-05-28 |
SEDRIS 합성환경 데이터 가시화를 위한 변환기 개발 강윤아; 김형기; 한순흥; 김만규, 2012 한국 CAD/CAM 학회 하계 학술대회, 한국 CAD/CAM 학회, 2012-08-23 |
SEDRIS를 사용한 국방 모의체계 합성환경 데이터베이스 구축 한순흥; 김형기, 육군 M&S 학술대회, 2010-11-18 |
SEDRIS를 활용한 실 환경 데이터의 합성환경 한순흥, 한국시뮬레이션학회 춘계학술대회, 한국시뮬레이션학회, 2011-05-28 |
See Video : An Interactive Video-on-Demand System Supporting Reliable Streaming of Stored Files Kang, SI; Song, Junehwa; Lee, Heung-Kyu, Proc. of ACIS Annual Int. Conf. on Computer and Information Science, IEEE, 2002-08 |
See-through LCDs using transparent light-guide plates Choi, W.-S.; Lee, J.-H.; Yeon, J.; Yoon, Jun-Bo, 15th International Display Workshops, IDW '08, pp.459 - 462, 2008-12-03 |
Seed Grain 방법에 의한 저전압용 Varistor 의 제조에 관한 연구 Kim, Chong Hee, 한국요업학외, 1985 |
Seed growing for interactive image segmentation with geodesic voting Park, Sun Jeong; Lee, Han Sang; Kim, Junmo, 23rd IEEE International Conference on Image Processing (ICIP), IEEE Signal Processing Society, 2016-09 |
Seed Layer를 이용한 PZT박막의 배향성 조절에 관한 연구 이원종; 강희수, 한국재료학회 춘계학술발표대회, pp.0 - 0, 2000-05-01 |
Seed light 주입형 RSOA 기반 WDM PON의 외부반사에 대한 내성 분석 정윤철; 전현채; 조근영; Takushima, Y, 광자기술 학술회의, 2008 |
Seed-Mediated Synthesis of Gold Nanorods and Surface Modification Based on Gold Binding Fusion Protein Hong, Won-Hi; Park, WM; Park, TJ; Lee, SY, The 21st International Symposium On Chemical Engineering Kyushu/Daejeon-Chungnam, 2008 |
Seeding ALD of high-k gate dielectric in CVD graphene FETs for enhanced device performance and reliability Shin, Woo Cheol; Cho, Byung Jin, Graphene Week 2012, 2012-06 |
Discover