Showing results 2621 to 2640 of 4139
Secure video transmission framework for battery-powered video devices Go, Kyungmin; Lee, Ilgu; Kang, Sungwon; Kim, Myung-Chul, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.1, pp.275 - 287, 2022-01 |
Securing a communication channel for the trusted execution environment Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06 |
Securing Database on Controlling Transactions in Multilevel Secure Databases Heung-Taek Kim; Myoung Ho Kim, JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE, v.5, no.3, pp.226 - 234, 2000-01 |
Securing mobile agents by integrity-based encryption Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09 |
Security analysis of an ID-based key agreement for peer group communication Vo, DL; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625, 2007-11 |
Security Framework for RFID-based Applications in Smart Home Environment Konidala, Divyan M.; Kim, Daeyoung; Yeun, Chan Yeob; Lee, Byoungcheon, JIPS(Journal of Information Processing Systems), v.7, no.1, pp.111 - 120, 2011-03 |
Security of a multisignature scheme for specified group of verifiers Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
Security of the Misty Structure beyond the Birthday Bound Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07 |
Security of the Misty Structure Using Involutions as Round Functions Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09 |
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08 |
SEDRIS Transmittal Storing and Retrieval System using Relational Databases Kim, Yong Kwon; Yang, Hee Jung; Chung, Chin Wan, JOURNAL OF DATABASE MANAGEMENT, v.25, no.4, pp.38 - 65, 2014-10 |
Segmental reliability weighting for robust recognition of partly corrupted speech Cho, HY; Kim, LY; Oh, Yung-Hwan, ELECTRONICS LETTERS, v.38, no.12, pp.611 - 612, 2002-06 |
Segmentation of handwritten characters for digitalizing Korean historical documents Kim, MS; Cho, KT; Kwag, HK; Kim, JinHyung, DOCUMENT ANALYSIS SYSTEMS VI, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3163, pp.114 - 124, 2004 |
Segmentation of Handwritten Characters for Digitalizing Korean Historical Documents Kim, Min Soo; Cho, Kyu Tae; Kwag, Hee Kue; Kim, Jin Hyung, Lecture Notes in Computer Science, Vol.3163, pp.114-124, 2004 |
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, ACM SIGPLAN NOTICES, v.51, no.4, pp.277 - 290, 2016-04 |
Selecting a routing strategy for your ad hoc network Lee, SJ; Hsu, J; Hayashida, R; Gerla, M; Bagrodia, R, COMPUTER COMMUNICATIONS, v.26, no.7, pp.723 - 733, 2003-05 |
Selective advance reservations based on host movement detection and resource-aware handoff Lee, K; Kim, Myungchul; Yu, CS; Lee, B; Hong, S, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.19, pp.163 - 184, 2006-03 |
Selective AP probing for indoor positioning in a large and AP-dense environment Jeon, Seokseong; Jeong, Jae-Pil; Suh, Young-Joo; Yu, Chansu; Han, Dongsoo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.99, pp.47 - 57, 2017-12 |
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01 |
Discover