Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 171-180 of 196 (Search time: 0.008 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
171
Decentralized group key management for dynamic networks using proxy cryptography

Hu,r J.; Shin, Y.; Yoon, Hyunsoo, Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks, pp.123 - 129, Association for Computing Machinery (ACM), 2007-10-22

172
An effective hotspot cell management scheme using adaptive handover time in 4G mobile networks

Kim, D.; Lee, S.; Lee, H.; Yoon, Hyunsoo, TENCON 2005 - 2005 IEEE Region 10 Conference, pp.1 - 6, IEEE, 2005-11-21

173
A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks

Kim, C.; Park, C.; Hur, J.; Lee, H.; Yoon, Hyunsoo, Future Generation Communication and Networking 2009, pp.405 - 412, FGCN, 2009-12-10

174
Grid-Based Energy-Efficient Routing from multiple sources to multiple mobile sinks in wireless sensor networks

Kweon, K.; Ghim, H.; Hong, J.; Yoon, Hyunsoo, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009, pp.1 - 5, IEEE, 2009-02-11

175
Security considerations for handover schemes in mobile WiMAX networks

Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31

176
A Distributed Model for Secure and Scalable Group Communication

Kim, H; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.7 - 12, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

177
Fast Computation Methods for Scalar Multiplication on Elliptic Curves defined over Higher Characteristic Finite Field

Lee, J; Kim, D; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.18 - 23, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

178
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

179
A Probabilistic Active Attack on Server-aided Secret Computation Protocols

Lee, S; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.24 - 33, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

180
Finding Shorter Addition/Subtraction-Chains

Kweon, K; Hong, SM; Oh, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.13 - 17, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

rss_1.0 rss_2.0 atom_1.0