Browse by Title 

Showing results 173241 to 173260 of 276173

173241
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

173242
Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

173243
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

173244
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

173245
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

173246
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

173247
Secure mobile agent using strong non-designated proxy signature

Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07

173248
Secure mobile device structure and application = 안전한 모바일 기기의 구조 및 응용에 관한 연구link

Lee, Yun-kyung; Yoon, Hyun-Soo; et al, 한국과학기술원, 2018

173249
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

173250
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

Lee, Younho; Kim, Pyung; Park, Yongsu, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18, 2016

173251
Secure one snapshot protocol for concurrency control in real-time stock trading systems

Kim, N; Moon, Songchun; Sohn, Y, JOURNAL OF SYSTEMS AND SOFTWARE, v.73, no.3, pp.441 - 454, 2004-11

173252
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

173253
Secure Personal Content Networking over Untrusted Devices

Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02

173254
Secure quantum communication by preserving an optimal measurement

Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29

173255
Secure quantum key expansion between two parties sharing a key

Ji, SW; Lee, Hai-Woong; Long, GL, JOURNAL OF THE KOREAN PHYSICAL SOCIETY, v.51, pp.1245 - 1251, 2007-10

173256
Secure query processing against encrypted XML data using Query-Aware Decryption

Lee, Jae-Gil; Whang, Kyu-Young, INFORMATION SCIENCES, v.176, no.13, pp.1928 - 1947, 2006-07

173257
Secure Remote Desktop with Necklace-Type Security Device

Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10

173258
Secure Storage Service for IaaS Cloud Users

Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14

173259
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO

Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09

173260
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI

Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04

rss_1.0 rss_2.0 atom_1.0