Browse "CS-Conference Papers(학술회의논문)" by Author Lee, Y

Showing results 1 to 12 of 12

1
A Fragile Watermakring Scheme For Binary Image Authentication using Hamming Code

Lee, Y; Kim, H; Park, Y; Chung, B; Yoon, Hyunsoo, 6th Asia Pacific International Symposium on Information Technology, pp.445 - 448, IEEE, 2007-01

2
A Haptic Enhancement Surgery Simulator with a Dual Model

Kim, Y; Lee, Y; Park, Jinah; Kim, S, 4th SPENALO International Symposium on Marin and Medical Robotics (SIS 2012), SPENALO, KITECH, 2012-09-07

3
A new proxy signature scheme providing self-delegation

Lee, Y; Kim, H; Park, Y; Yoon, Hyunsoo, ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.328 - 342, Springer Verlag (Germany), 2006-11-30

4
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

5
Adaptive cross-channel interference cancelation on blind signal outputs using source absence/presence detection and spectral subtraction

Jang, GJ; Choi, C; Lee, Y; Oh, Yung-Hwan, ICSLP2004-INTERSPEECH, pp.IV-2865 - 2868, 2004

6
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks

Yoon, Hyunsoo; Lee, Y; Kim, H; Chung, B; Park, Y, The International Conference on Information Networking 2007, pp.445 - 448, 2007-01-23

7
Group Context-aware Service Discovery for Supporting Continuous Service Availability

Kang, S; Kim, W; Lee, DongMan; Lee, Y, ubiPCMM'05, pp.62 - 63, 2005-09

8
Hardware Stack Design Towards an Effective Defense Against From Pointer Overwriting Attacks

Yoon, Hyunsoo; Park, Y; Lee, Y; Kim, H; Lee, GJ; Kim, IH, The 1th International Workshop on Security (IWSEC'06) - LNCS, pp.268 - 277, 2006-09-23

9
Multimedia Handling and Storage

Whang, Kyu-Young; Moon, S; Lee, Y; Kim, M, Int’l Workshop on Intelligent Computer, pp.259 - 271, 1990-11

10
Table Driven Proportional Access based Real-Time Ethernet

Kim, Daeyoung; Doh , Y; Lee, Y, PRDC'01, pp.0 - 0, 2001-12

11
The Clustering Property of Corner Transformation for Spatial Databases

Song, J; Whang, Kyu-Young; Lee, Y; Kim, S, pp.0 - 0, 1999-10-25

12
Trust-Based Secure Aggregation in Wireless Sensor Networks

Hur, J; Lee, Y; Hong, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.1 - 6, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07

Discover

rss_1.0 rss_2.0 atom_1.0