Browse "School of Computing(전산학부)" by Type Article

Showing results 2621 to 2640 of 4139

2621
Secure video transmission framework for battery-powered video devices

Go, Kyungmin; Lee, Ilgu; Kang, Sungwon; Kim, Myung-Chul, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.1, pp.275 - 287, 2022-01

2622
Securing a communication channel for the trusted execution environment

Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

2623
Securing Database on Controlling Transactions in Multilevel Secure Databases

Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01

2624
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

2625
Security analysis of an ID-based key agreement for peer group communication

Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11

2626
Security Framework for RFID-based Applications in Smart Home Environment

Konidala, Divyan M.; Kim, Daeyoung; Yeun, Chan Yeob; Lee, Byoungcheon, JIPS(Journal of Information Processing Systems), v.7, no.1, pp.111 - 120, 2011-03

2627
Security of a multisignature scheme for specified group of verifiers

Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07

2628
Security of permutation-based compression function lp231

Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

2629
Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

2630
Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

2631
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks

Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08

2632
SEDRIS Transmittal Storing and Retrieval System using Relational Databases

Kim, Yong Kwon; Yang, Hee Jung; Chung, Chin Wan, JOURNAL OF DATABASE MANAGEMENT, v.25, no.4, pp.38 - 65, 2014-10

2633
Segmental reliability weighting for robust recognition of partly corrupted speech

Cho, HY; Kim, LY; Oh, Yung-Hwan, ELECTRONICS LETTERS, v.38, no.12, pp.611 - 612, 2002-06

2634
Segmentation of handwritten characters for digitalizing Korean historical documents

Kim, MS; Cho, KT; Kwag, HK; Kim, JinHyung, DOCUMENT ANALYSIS SYSTEMS VI, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3163, pp.114 - 124, 2004

2635
Segmentation of Handwritten Characters for Digitalizing Korean Historical Documents

Kim, Min Soo; Cho, Kyu Tae; Kwag, Hee Kue; Kim, Jin Hyung, Lecture Notes in Computer Science, Vol.3163, pp.114-124, 2004

2636
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services

Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, ACM SIGPLAN NOTICES, v.51, no.4, pp.277 - 290, 2016-04

2637
Selecting a routing strategy for your ad hoc network

Lee, SJ; Hsu, J; Hayashida, R; Gerla, M; Bagrodia, R, COMPUTER COMMUNICATIONS, v.26, no.7, pp.723 - 733, 2003-05

2638
Selective advance reservations based on host movement detection and resource-aware handoff

Lee, K; Kim, Myungchul; Yu, CS; Lee, B; Hong, S, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.19, pp.163 - 184, 2006-03

2639
Selective AP probing for indoor positioning in a large and AP-dense environment

Jeon, Seokseong; Jeong, Jae-Pil; Suh, Young-Joo; Yu, Chansu; Han, Dongsoo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.99, pp.47 - 57, 2017-12

2640
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0