Browse by Subject access control

Showing results 1 to 16 of 16

1
A novel privacy preserving authentication and access control scheme for pervasive computing environments

Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07

2
A novel two-phase access priority scheme in wireless communication systems

Kwwon, Taesoo; Cho, Dong-Ho, IEEE COMMUNICATIONS LETTERS, v.9, no.3, pp.216 - 218, 2005-03

3
An Enhanced Rule-Based Web Scanner Based on Similarity Score

Lee, Minsoo; Lee, Younho; Yoon, Hyunsoo, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.3, pp.9 - 14, 2016

4
Filtering XPath expressions for XML access control

Jeon, JM; Chung, YD; Kim, Myoung Ho; Lee, Yoon Joon, COMPUTERS & SECURITY, v.23, no.7, pp.591 - 605, 2004

5
Fine-grained user access control in ciphertext-policy attribute-based encryption

Hur, J; Park, C; Hwang, SO, SECURITY AND COMMUNICATION NETWORKS, v.5, no.3, pp.253 - 261, 2012

6
Improved channel assignment scheme with access control for the common packet channel in WCDMA systems

So, Jae Woo; Cho, Dong-Ho; Minsoo Suk, IEEE COMMUNICATIONS LETTERS, v.6, no.5, pp.184 - 186, 2002-05

7
Performance analysis of a DS/SSMA unslotted ALOHA system with two user classes

So, Jae Woo; Cho, Dong-Ho, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.51, no.6, pp.1628 - 1639, 2002-11

8
Reactive key management scheme for access control in group communications

Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04

9
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are

Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10

10
Selective encryption and conditional access control for ROI scalability in scalable video coding = 스케일러블 비디오 코딩에서 ROI 스케일러빌리티를 위한 선택적 암호화 및 조건적 접근제어link

Kim, Yeon-Gyun; 김연균; et al, 한국정보통신대학교, 2008

11
Spare reservation and distributed release based multiple access for satellite multimedia services

Kwwon, Taesoo; Cho, Dong-Ho, IEEE COMMUNICATIONS LETTERS, v.8, no.1, pp.27 - 29, 2004-01

12
Study on designing a secure gateway to realize secure IoT environments = 안전한 IoT 환경을 구축하기 위한 보안 게이트웨이 연구link

Kim, Yeon-Keun; Shin, Seung Won; et al, 한국과학기술원, 2016

13
The dynamic predicate: integrating access control with query processing in XML databases

Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, VLDB JOURNAL, v.16, pp.371 - 387, 2007-07

14
술어를 이용한 내용 의존적 권한부여 기법

홍성림; 박창원; 정진완, 정보과학회논문지 : 데이타베이스, v.30, no.1, pp.1 - 13, 2003-02

15
신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법

허준범; 윤현수, 정보과학회논문지 : 정보통신, v.36, no.6, pp.471 - 480, 2009-12

16
접근 제어를 위한 반응적 방식의 그룹키 관리 기법

김희열; 이윤호; 박용수; 윤현수, 정보과학회논문지 : 시스템 및 이론, v.34, no.11, pp.589 - 598, 2007-12

rss_1.0 rss_2.0 atom_1.0