Showing results 1 to 11 of 11
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments Konidala, D.M.; Duc, D.N.; Lee, DongMan; Kim, K, 2004년도 한국정보보호학회 하계정보보호학술대회, pp.0 - 0, 한국정보보호학회, 2004-06 |
Broadband Access Network and Self-Routing Switch with Back-Pressure Kim, K; Kim, Daeyoung, IEEE International Conference on Communication Systems, pp.0 - 0, 1996-11 |
Design of secure VoIP using ID-Based Cryptosystem Han, K; Yeun, C; Kim, K, Proc. Of SCIS 2008, Institute of Electronics, Information and Communication Engineers, 2008-01 |
Dimension-Reduced Estimation of Word Co-occurrence Probability Kim, K; Choi, Key-Sun, Annual Meeting of the Association for Computational Linguistics, pp.571 - 578, Annual Meeting of the Association for Computational Linguistics, 2000-10 |
Improving fairness and privacy of Zhou-Gollmann''s fair non-repudiation protocol Kim, K; Park, S; Baek, J, 1999 ICPP Workshops on Security(IWSEC), pp.140 - 145, IEEE, 1999-09-21 |
Mutually Authenticated Key Exchange Protocol For Computationally Limited Devices Kim, Z; Kim, K; Kang, Y, Triangle Symposium on Advanced ICT, TriSAI, 2008-10-06 |
New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP Han, K; Yoon, C; Kim, K, Triangle Symposium on Advanced ICT 2008, TriSAI, 2008-10-06 |
Quorum based algorithms using group choice Kim, K; Park, JH; Manabe, Y, 2002년도 한국정보보호학회 학술대회, pp.53 - 56, 한국정보보호학회, 2002-11-16 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Virtual Bone Drilling for Dental Implant Training - Bone Drilling Simulation with Haptic Feedback Kim, K; Park, Jinah, ASIAGRAPH 2008 in Tokyo, 2008-10-23 |
Volume-based Haptic Model for Bone-drilling Kim, K; Park, YS; Park, Jinah, 2008 International Conference on Control, Automation and Systems, IEEE, 2008-10-14 |
Discover