Hong, Jaemin; Shim, Sunghwan; Park, Sanguk; Kim, Tae Woo; Kim, Jungwoo; Lee, Junsoo; Ryu, Sukyoung; Kang, Jeehoon, SCIENCE OF COMPUTER PROGRAMMING, v.238, 2024-12
Jeong, Hoyong; Chung, Kiwon; Hwang, Sung Ju; Son, Sooel, COMPUTERS SECURITY, v.144, 2024-09
Jung, Gyuwon; Park, Sangjun; Ma, Eun-Yeol; Kim, Heeyoung; Lee, Uichin, ACM COMPUTING SURVEYS, v.56, no.9, 2024-09
Kim, Minsu; Hwang, Jinwoo; Heo, Guseul; Cho, Seiyeon; Mahajan, Divya; Park, Jongse, PROCEEDINGS OF THE VLDB ENDOWMENT, v.17, no.8, pp.1802 - 1815, 2024-08
HA, TAEWOOK; Kim, Myoung Ho, 정보과학회 컴퓨팅의 실제 논문지, v.30, no.8, pp.347 - 353, 2024-08
Yi, Shinyoung; Kim, Donggun; Na, Jiwoong; Tong, Xin; Kim, Min Hyuk, ACM Transactions on Graphics, v.43, no.4, 2024-07
Son, Sunmin; Jung, Jingun; Ham, Auejin; Lee, Geehyuk, INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, v.40, no.13, pp.3539 - 3551, 2024-07
Kim, Mincheul; Kwon, Youngsun; Lee, Sebin; Yoon, Sung-Eui, IEEE ROBOTICS AND AUTOMATION LETTERS, v.9, no.6, pp.5767 - 5774, 2024-06
Hwang, Soojin; Baek, Daehyeon; Park, Jongse; Huh, Jaehyuk, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.21, no.2, 2024-06
Lee, Juho; Choi, Jin Woo; Jo, Sung-Ho, IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, v.16, no.3, pp.923 - 934, 2024-06
지그비의 계층적 라우팅 성능 향상 방안 김태홍; 김대영; 유성은; 성종우; 김영수, 대한임베디드공학회논문지, 2006-12 |
Goal-directed Weakening of Abstract Interpretation Results Seo, Sunae; Yang, Hongseok; Yi, Kwangkeun; Han, Taisook, ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, v.29, no.10, 2007-10 |
A static API birthmark for Windows binary executables Choi, Seok-Woo; Park, Hee-Wan; Lim, Hyun-Il; Han, Tai-Sook, JOURNAL OF SYSTEMS AND SOFTWARE, v.82, no.5, pp.862 - 873, 2009-05 |
A method for detecting the theft of Java programs through analysis of the control flow information Lim, Hyun-il; Park, Heewan; Choi, Seokwoo; Han, Taisook, INFORMATION AND SOFTWARE TECHNOLOGY, v.51, no.9, pp.1338 - 1350, 2009-09 |
A static bug detector for uninitialized field references in Java programs Seo, Sunae; Kim, Youil; Kang, Hyun-Goo; Han, Taisook, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E90D, no.10, pp.1663 - 1671, 2007-10 |
A bottom-up pointer analysis using the update history Kang, Hyun-Goo; Han, Taisook, INFORMATION AND SOFTWARE TECHNOLOGY, v.51, no.4, pp.691 - 707, 2009-04 |
Detecting theft of Java applications via a static birthmark based on weighted stack patterns Lim, Hyun-il; Park, Heewan; choi, Seokwoo; Han, Taisook, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E91D, no.9, pp.2323 - 2332, 2008-09 |
MPSoC용 임베디드 소프트웨어의 PSM 모델링 및 시뮬레이션 오기영; 홍장의; 배두환; 송인권, 정보과학회논문지 : 소프트웨어 및 응용, v.34, no.8, pp.697 - 707, 2007-08 |
Composition of aspects based on a relation model: Synergy of multiple paradigms Han, Ikjoo; Bae, Doo-Hwan, INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, v.16, no.3, pp.379 - 402, 2006-06 |
유즈케이스를 적용한 시스템 기능 분해 윤, 청; 김, 응모; 배, 두환; Yoon, Cheong; Kim, Ung Mo; Bae, Doo Hwan, 정보과학회논문지(B), Vol.26, No.2, pp.263-272, 1999-02 |
텔래매틱스 데이터 관리 이현익; 이진원; 송준화, 한국자동차공학회 논문집, v.26, no.6, pp.6 - 10, 2004-12 |
CONUGA: Constrained user-group assignment Ahn, Gail-Joon; Kim, Kwangjo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.24, no.2, pp.87 - 100, 2001-04 |
A new identification scheme based on the bilinear Diffle-Hellman problem Kim, M; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.362 - 378, 2002-07 |
C&C 아키텍처 기반의 객체지향 설계 강성원; 최윤석; 이단형; 박형일, 정보과학회논문지 : 소프트웨어 및 응용, v.34, no.4, pp.317 - 327, 2007-04 |
소프트웨어 상호운영성 시험 체계와 방법론 신재휘; 성종진; 홍경표; 강성원, 정보과학회논문지 : 소프트웨어 및 응용, v.31, no.4, pp.394 - 402, 2004-04 |
예측 기반 동적 자원할당 구조를 이용한 실시간 VBR 비디오 트래픽의 QoS 제어방법 유상조; 홍성훈; 강성원; 홍경표, 한국통신학회논문지, v.27, no.1, pp.11 - 20, 2002-01 |
Efficient authenticated key agreement protocol for dynamic groups Ren, Kui; Lee, Hyunrok; Kim, Kwangjo; Yoo, T, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159, 2005 |
Threshold password-based authentication using bilinear pairings Lee, Sangwon; Han, Kyusuk; Kang, Seok-kyu; Kim, Kwangjo; Ine, So Ran, PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3093, pp.350 - 363, 2004 |
Yet another forward secure signature from bilinear pairings Vo, Duc-Liem; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.441 - 455, 2006-02 |
Secure authenticated group key agreement protocol in the MANET environment Yeun C.Y.; Han K.; Vo D.L.; Kim, Kwangjo, INFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164, 2008-08 |
Discover