Browse by Type Article

Showing results 71161 to 71180 of 100321

71161
Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, Yongdae, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

71162
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

71163
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

71164
Secure mobile agent using strong non-designated proxy signature

Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07

71165
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

71166
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

Lee, Younho; Kim, Pyung; Park, Yongsu, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18, 2016

71167
Secure one snapshot protocol for concurrency control in real-time stock trading systems

Kim, N; Moon, Songchun; Sohn, Y, JOURNAL OF SYSTEMS AND SOFTWARE, v.73, no.3, pp.441 - 454, 2004-11

71168
Secure Personal Content Networking over Untrusted Devices

Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02

71169
Secure quantum key expansion between two parties sharing a key

Ji, SW; Lee, Hai-Woong; Long, GL, JOURNAL OF THE KOREAN PHYSICAL SOCIETY, v.51, pp.1245 - 1251, 2007-10

71170
Secure query processing against encrypted XML data using Query-Aware Decryption

Lee, Jae-Gil; Whang, Kyu-Young, INFORMATION SCIENCES, v.176, no.13, pp.1928 - 1947, 2006-07

71171
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO

Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09

71172
Secure transmission in downlink cellular network with a Cooperative Jammer

Jeong, S.; Lee, Keon-Kook; Huh, Hoon; Kang, Joonhyuk, IEEE Wireless Communications Letters, v.2, no.4, pp.463 - 466, 2013-08

71173
Secure Type-Based Multiple Access

Jeon, Hyoungsuk; Hwang, Daesung; Choi, JH; Lee, HyuckJae; Ha, Jeongseok, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.6, pp.763 - 774, 2011-09

71174
Secure video transmission framework for battery-powered video devices

Go, Kyungmin; Lee, Ilgu; Kang, Sungwon; Kim, Myung-Chul, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.1, pp.275 - 287, 2022-01

71175
Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori

Seo, Junghaa; Park, Sangwoo; Kang, Joonhyuk, ICT EXPRESS, v.8, no.2, pp.220 - 224, 2022-06

71176
SecureLinQ: Joint Precoding and Scheduling for Secure Device-to-Device Networks

Choi, Jinseok; Park, Jeonghun, IEEE WIRELESS COMMUNICATIONS LETTERS, v.9, no.12, pp.2078 - 2082, 2020-12

71177
Securing a communication channel for the trusted execution environment

Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

71178
Securing Database on Controlling Transactions in Multilevel Secure Databases

Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01

71179
Securing design checking service for the regulation-based product design

Kim, Ikjune; Lee, Jaechul; Mun, Duhwan; Jun, Hongbae; Hwang, Jinsang; Kim, Jeong Tae; Han, Soonhung, COMPUTERS IN INDUSTRY, v.63, no.6, pp.586 - 596, 2012-08

71180
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

rss_1.0 rss_2.0 atom_1.0