Showing results 61341 to 61360 of 91093
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06 |
Secured radio communication based on fusion of cryptography algorithms Kim, Yoon Jib; Kyung, Ki-Uk, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp.388 - 389, Institute of Electrical and Electronics Engineers Inc., 2015-01 |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Securing mobile agents by integrity-based encryption Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
Security and Privacy on Authentication Protocol for Low-cost RFID Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01 |
Security and Safeguard of Small Modular Reactors: Assessing Potential Risk for SMR Deployment in Southeast Asia Prawira, Andhika Yudha; Yasmine, Hanna; Yim, Man-Sung, 2023 INMM & ESARDA Joint Annual Meeting, Institute of Nuclear Materials Management (INMM) and ESARDA, 2023-05-23 |
Security Associations based Load Distribution among Parallel VPN servers Choi, M.G.; Choi, Y.W.; Kim, C.S.; Kim, Sehun, The 2003 Australian Telecommunications Networks and Applications Conference (ATNAC), 2003 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Discover