Results 1-9 of 9 (Search time: 0.005 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
A personal information leakage prevention method on the Internet Choi, D.; Jin, S.; Yoon, Hyunsoo, 2006 IEEE 10th International Symposium on Consumer Electronics, ISCE 2006, pp.646 - 650, 2006-06-28 | |
Empirical Study of the Performance of ZigBee MAC Protocol Kim, B; So, S; Eun, S; Yoon, Hyunsoo, ICEIC 2006 (The Int'l Conference on Electronics, Information, and Communication), pp.483 - 487, 2006 | |
A method for preventing the leakage of the personal information on the internet Choi, D; Jin, S; Yoon, Hyunsoo, 8th International Conference Advanced Communication Technology, ICACT 2006, pp.1195 - 1198, 2006-02-21 | |
Hardware Stack Design Towards an Effective Defense Against From Pointer Overwriting Attacks Yoon, Hyunsoo; Park, Y; Lee, Y; Kim, H; Lee, GJ; Kim, IH, The 1th International Workshop on Security (IWSEC'06) - LNCS, pp.268 - 277, 2006-09-23 | |
Identity Centric Management of Distributed User Created Content Choi, D; Kim, S; Jin, S; Yeo, K; Yoon, Hyunsoo, International Ubiquitous Convergence Conference (IUC 2006), pp.263 - 267, 2006-12-07 | |
Pre-authentication for Fast handoff in Wireless mesh networks including mobile APs Park, C; Hur, J; Kim, C; Shin, Y; Yoon, Hyunsoo, WISA 2006 (International Workshop on Information Security Applications) (LNCS), pp.679 - 693, 2006-08 | |
Traffic volume forecasting model for cyber weather forecasting Yun, J.; Paek, SH; Lee, D.; Yoon, Hyunsoo, 2006 International Conference on Hybrid Information Technology, ICHIT 2006, pp.274 - 276, ICHIT '06, 2006-11-09 | |
Digital rights management with right delegation for home networks Kim, H.; Lee, Y.; Chung, B.; Yoon, Hyunsoo; Lee, J.; Jung, K., ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.233 - 245, Springer Verlag (Germany), 2006-11-30 | |
A new proxy signature scheme providing self-delegation Lee, Y; Kim, H; Park, Y; Yoon, Hyunsoo, ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.328 - 342, Springer Verlag (Germany), 2006-11-30 |
Discover