Showing results 1 to 16 of 16
A novel privacy preserving authentication and access control scheme for pervasive computing environments Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07 |
A novel two-phase access priority scheme in wireless communication systems Kwwon, Taesoo; Cho, Dong-Ho, IEEE COMMUNICATIONS LETTERS, v.9, no.3, pp.216 - 218, 2005-03 |
An Enhanced Rule-Based Web Scanner Based on Similarity Score![]() Lee, Minsoo; Lee, Younho; Yoon, Hyunsoo, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.3, pp.9 - 14, 2016 |
Filtering XPath expressions for XML access control Jeon, JM; Chung, YD; Kim, Myoung Ho; Lee, Yoon Joon, COMPUTERS & SECURITY, v.23, no.7, pp.591 - 605, 2004 |
Fine-grained user access control in ciphertext-policy attribute-based encryption Hur, J; Park, C; Hwang, SO, SECURITY AND COMMUNICATION NETWORKS, v.5, no.3, pp.253 - 261, 2012 |
Improved channel assignment scheme with access control for the common packet channel in WCDMA systems So, Jae Woo; Cho, Dong-Ho; Minsoo Suk, IEEE COMMUNICATIONS LETTERS, v.6, no.5, pp.184 - 186, 2002-05 |
Performance analysis of a DS/SSMA unslotted ALOHA system with two user classes So, Jae Woo; Cho, Dong-Ho, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.51, no.6, pp.1628 - 1639, 2002-11 |
Reactive key management scheme for access control in group communications Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04 |
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10 |
Selective encryption and conditional access control for ROI scalability in scalable video coding = 스케일러블 비디오 코딩에서 ROI 스케일러빌리티를 위한 선택적 암호화 및 조건적 접근제어link Kim, Yeon-Gyun; 김연균; et al, 한국정보통신대학교, 2008 |
Spare reservation and distributed release based multiple access for satellite multimedia services Kwwon, Taesoo; Cho, Dong-Ho, IEEE COMMUNICATIONS LETTERS, v.8, no.1, pp.27 - 29, 2004-01 |
Study on designing a secure gateway to realize secure IoT environments = 안전한 IoT 환경을 구축하기 위한 보안 게이트웨이 연구link Kim, Yeon-Keun; Shin, Seung Won; et al, 한국과학기술원, 2016 |
The dynamic predicate: integrating access control with query processing in XML databases Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, VLDB JOURNAL, v.16, pp.371 - 387, 2007-07 |
술어를 이용한 내용 의존적 권한부여 기법 홍성림; 박창원; 정진완, 정보과학회논문지 : 데이타베이스, v.30, no.1, pp.1 - 13, 2003-02 |
신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법 허준범; 윤현수, 정보과학회논문지 : 정보통신, v.36, no.6, pp.471 - 480, 2009-12 |
접근 제어를 위한 반응적 방식의 그룹키 관리 기법 김희열; 이윤호; 박용수; 윤현수, 정보과학회논문지 : 시스템 및 이론, v.34, no.11, pp.589 - 598, 2007-12 |
Discover