Showing results 4741 to 4800 of 7390
SCI를 기반으로 한 공유메모리 다중처리기를 위한 PCI-SCI 브리지 조정완, Proceedings of KISS Conference, pp.31 - 34, 1997 |
SCoAP: An Integration of CoAP Protocol With Web-based Application Nam, Giang; Ha, Minkeun; Kim, Daeyoung, IEEE Global Communications Conference, Exhibition & Industry Forum (GLOBECOM), pp.2648 - 2653, IEEE, 2013-12-11 |
SCORE: A scalable concolic testing tool for reliable embedded software Kim, Yunho; Kim, Moonzoo, ACM SIGSOFT Foundation of Software Engineering (FSE) Tool demonstration track, pp.420 - 423, ACM SIGSOFT Foundation of Software Engineering (FSE) Tool demonstration track, 2011-09-05 |
Screenshot identification using combing artifact from interlaced video Lee, JW; Lee, MJ; Oh, TW; Ryu, SJ; Lee, Heung-Kyu, 12th ACM Multimedia Security Workshop, pp.49 - 54, ACM, 2010-09-09 |
ScriptFree: Designing Speech Preparation Systems with Adaptive Visual Reliance Control on Script Oh, Jeungmin; Edge, Darren; Lee, Uichin, 2020 ACM CHI Conference on Human Factors in Computing Systems, CHI EA 2020, Association for Computing Machinery (ACM), 2020-04-25 |
SCTP-SIP를 이용한 이종망간 이동성 관리 기법 박혜림; 김명철; 이수용; 양기원; 김용호, 한국정보과학회 추계학술대회, pp.187 - 188, 한국정보과학회, 2008 |
SCV: Structure and constant value based binary diffing Park, Heewan; Choi, Seokwoo; Seo, Sunae; Han, Taisook, 2nd International Conference on Information Security and Assurance, ISA 2008, pp.32 - 35, IEEE, 2008-04-24 |
SDH-based ATM 프로토콜 플랫포옴 구현 전종암; 김경수; 박영호; 김대영; 김협종, 대한전자공학회 학술대회, 대한전자공학회, 1993 |
SDIO에서 RAID 레벨 5의 효율적인 구현 김호진; 황인철; 맹승렬; 윤현수, 한국정보과학회 제31회 춘계 학술대회, pp.64 - 66, 한국정보과학회, 2004-04-23 |
SDIO에서 RAID-5의 설계 및 구현 김호진; 황인철; 맹승렬; 윤현수, 한국정보과학회 04 봄 학술발표, pp.0 - 0, 한국정보과학회, 2004-04-01 |
SDIO에서의 디스크 이질성 지원 김호진; 황인철; 김동환; 맹승렬; 윤현수, 한국정보과학회 2004 가을 학술발표, pp.0 - 0, 한국정보과학회, 2004-10 |
SDN and Pacnet Chon, Kil Nam, 2nd International Joint Workshop on Computer Communica-tion, 1987 |
SDN Name Server 전길남, 한국정보과학회 1983년도 가을 학술발표, v.10, no.2, 1983 |
SDN Status Report 전길남, Proc. of WCCW, 1987 |
SDN Status Report 전길남, 한국정보과학회 1983년도 가을 학술발표, v.10, no.2, 1985 |
SDN 웹 인터페이스를 대상으로 한 CSRF 취약점 탐지 방법 위성일; 이현주; 손수엘, 2020 한국정보보호학회 하계학술대회, 한국정보보호학회, 2020-07-15 |
SDN: A Computer Network for Korean Research Community Chon, Kil Nam, Proc. of PCCS, pp.567 - 570, 1985 |
SDN에서 Flow 기반 침입 탐지 시스템의 탐지 성능 개선 방법 이동수; 김광조, CISC-W'14, 한국정보보호학회, 2014-12-06 |
Seamless handoff scheme for 4G mobile systems based on IP and OFDM Kim, N.; Choi, H.; Yoon, Hyunsoo, 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security, pp.3315 - 3318, IEEE, 2004-09-26 |
Seamless mobile robot localization service framework for integrated localization systems Kang, J.; Kim, Daeyoung; Kim, E.; Kim, Y.; Yoo, S.-E.; Wi, D., 3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008, pp.175 - 179, IEEE, 2008-05-07 |
Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource Reservation Lee, Sooyong; Kim, Myungchul; Lee, Kyounghee; Seol, Soonuk; Lee, Gabsoo, 22nd International Conference on Advanced Information Networking and Applications, pp.464 - 471, IEEE, 2008 |
Search based data sensitivity analysis applied to requirement engineering Harman, Mark; Krinke, Jens; Ren, Jian; Yoo, Shin, 11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009, pp.1681 - 1688, ACM SIGEVO, 2009-07-10 |
Search Rays를 이용한 자동화된 3D 심장 세그멘테이션 김석열; 김재일; 박진아, 2008 한국컴퓨터그래픽스학회 하계학술대회, 한국컴퓨터그래픽스학회, 2008-07-07 |
Searching a room by two guards Park S.-M.; Lee J.-H.; Chwa, Kyung Yong, v.12, no.4, pp.339 - 352 |
Searching Animation Models with a Lexical Ontology for Text Animation Chang, Eunyoung; Park, Jong Cheol, Annual Meetings of the Human Computer Interaction, Human Computer Interaction, 2007-02 |
Searching for Multi-fault Programs in Defects4J An, Gabin; Yoon, Juyeon; Yoo, Shin, 13th International Symposium on Search Based Software Engineering, SSBSE 2021, pp.153 - 158, Springer International Publishing, 2021-10-11 |
SeCGAN: Parallel Conditional Generative Adversarial Networks for Face Editing via Semantic Consistency Sun, Justin; Bhattarai, Binod; Chen, Zhixiang; Kim, Tae-Kyun, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), AI for Content Creation Workshop, IEEE, CVF, 2022-06-19 |
Secondary User Games with Spectrum Leasing Market in Cooperative Cognitive Radio Networks Roh, Heejun; Lee, Sinjae; Lee, Wonjun; Shao, Chenglong; Du, Ding-Zhu, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Communications Society, 2013-04-14 |
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08 |
Sector log: Fine-grained storage management for solid state drives Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21 |
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01 |
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005 |
Secure Approach to Deploy RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12 |
Secure Consolidated Authorization Mechanism for Supply Chain Management Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001 |
Secure group communication with multiplicative one-way functions Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04 |
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20 |
Secure In-memory Key-Value Storage with SGX Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Secure Many-to-many Multicast in Heterogenous Networks Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11 |
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06 |
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01 |
Secure Storage Service for IaaS Cloud Users Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14 |
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27 |
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06 |
Securing AES against Second-Order DPA by simple Fixed-Value Masking Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10 |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 |
Securing HB+ against GRS Man-in-the-Middle Attack Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Securing mobile agents by integrity-based encryption Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21 |
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
Security and Privacy on Authentication Protocol for Low-cost RFID Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security notions for the random oracle model in classical and quantum settings Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
See Video : An Interactive Video-on-Demand System Supporting Reliable Streaming of Stored Files Kang, SI; Song, Junehwa; Lee, Heung-Kyu, Proc. of ACIS Annual Int. Conf. on Computer and Information Science, IEEE, 2002-08 |
SEED의 차분전력공격에 대한 강화 방안 장화선; 박상배; 김광조, 2003년도 한국정보보호학회 동계학술대회, pp.274 - 280, 한국정보보호학회, 2003-12-06 |
Discover