Results 171-180 of 196 (Search time: 0.008 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Decentralized group key management for dynamic networks using proxy cryptography Hu,r J.; Shin, Y.; Yoon, Hyunsoo, Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks, pp.123 - 129, Association for Computing Machinery (ACM), 2007-10-22 | |
An effective hotspot cell management scheme using adaptive handover time in 4G mobile networks Kim, D.; Lee, S.; Lee, H.; Yoon, Hyunsoo, TENCON 2005 - 2005 IEEE Region 10 Conference, pp.1 - 6, IEEE, 2005-11-21 | |
A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks Kim, C.; Park, C.; Hur, J.; Lee, H.; Yoon, Hyunsoo, Future Generation Communication and Networking 2009, pp.405 - 412, FGCN, 2009-12-10 | |
Grid-Based Energy-Efficient Routing from multiple sources to multiple mobile sinks in wireless sensor networks Kweon, K.; Ghim, H.; Hong, J.; Yoon, Hyunsoo, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009, pp.1 - 5, IEEE, 2009-02-11 | |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 | |
A Distributed Model for Secure and Scalable Group Communication Kim, H; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.7 - 12, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 | |
Fast Computation Methods for Scalar Multiplication on Elliptic Curves defined over Higher Characteristic Finite Field Lee, J; Kim, D; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.18 - 23, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 | |
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 | |
A Probabilistic Active Attack on Server-aided Secret Computation Protocols Lee, S; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.24 - 33, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 | |
Finding Shorter Addition/Subtraction-Chains Kweon, K; Hong, SM; Oh, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.13 - 17, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 |
Discover