Browse "School of Computing(전산학부)" by Type Article

Showing results 2601 to 2620 of 4139

2601
SCI: 과연 정보과학 분야에서도 유효한 연구업적 평가척도인가?

정진완; 문수복; 민상렬; 이재용; 최진영, 정보과학회지, v.22, no.8, pp.70 - 76, 2004-08

2602
SCR 요구사항 명세의 정형적인 의미론

홍형석; 차성덕; 권용래, 정보과학회논문지 : 소프트웨어 및 응용, v.26, no.8, pp.988 - 999, 1999-08

2603
Screenshot identification by analysis of directional inequality of interlaced video

Lee, Ji-Won; Lee, Min-Jeong; Lee, Hae-Yeoun; Lee, Heung-Kyu, EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2012-05

2604
Search Based Software Engineering - Evolving Human Competitive Spectra-Based Fault Localisation Techniques

Yoo, Shin, Lecture Notes in Computer Science, v.7515, pp.244 - 258, 2012

2605
Search-Based Approaches for Software Module Clustering Based on Multiple Relationship Factors

Hwa, Jimin; Yoo, Shin; Seo, Yeong-Seok; Bae, Doo-Hwan, INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, v.27, no.7, pp.1033 - 1062, 2017-09

2606
Searching a polygonal room with one door by a 1-searcher

Chwa, Kyung Yong, INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY & APPLICATIONS, v.10, no.2, pp.201 - 220, 2000-04

2607
Searching a room by two guards

Chwa, Kyung Yong; 박상민; 이재하, INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY & APPLICATIONS, v.12, no.4, pp.339 - 352, 2002-08

2608
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage

Koo, Dong-Young; Hur, Jun-Beom; Yoon, Hyun-Soo, COMPUTERS & ELECTRICAL ENGINEERING, v.39, no.1, pp.34 - 46, 2013-01

2609
Secure authenticated group key agreement protocol in the MANET environment

Yeun C.Y.; Han K.; Vo D.L.; Kim, Kwangjo, INFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164, 2008-08

2610
Secure Bit-Plane Based Steganography for Secret Communication

Bui, Cong-Nguyen; Lee, Hae-Yeoun; Joo, Jeong-Chun; Lee, Heung-Kyu, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.79 - 86, 2010-01

2611
Secure Consolidated Authorization Mechanism for Supply Chain Management

Seung-Phil Hong; Gail-joon Ahn; Kim, Myungchul, INTERNATIONAL JOURNAL OF COMPUTER AND INFORMATION SCIENCE, v.4, no.0, pp.0 - 0, 2003-01

2612
Secure group communication with low communication complexity

Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004

2613
Secure Group Communication with Low Communication Complexity

Kim, Heeyoul; Lee, Jaewon; Yoon, hyunsoo, Lecture Notes in Computer Science, Volume 3320/2005, 586-590, 2004-12

2614
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000

2615
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

2616
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

2617
Secure mobile agent using strong non-designated proxy signature

Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07

2618
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

2619
Secure Personal Content Networking over Untrusted Devices

Lee, Uichin; Joy, Josh; Noh, Youngtae, WIRELESS PERSONAL COMMUNICATIONS, v.80, no.4, pp.1449 - 1473, 2015-02

2620
Secure query processing against encrypted XML data using Query-Aware Decryption

Lee, Jae-Gil; Whang, Kyu-Young, INFORMATION SCIENCES, v.176, no.13, pp.1928 - 1947, 2006-07

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0