Browse "School of Computing(전산학부)" by Type Conference

Showing results 4741 to 4800 of 7390

4741
SCI를 기반으로 한 공유메모리 다중처리기를 위한 PCI-SCI 브리지

조정완, Proceedings of KISS Conference, pp.31 - 34, 1997

4742
SCoAP: An Integration of CoAP Protocol With Web-based Application

Nam, Giang; Ha, Minkeun; Kim, Daeyoung, IEEE Global Communications Conference, Exhibition & Industry Forum (GLOBECOM), pp.2648 - 2653, IEEE, 2013-12-11

4743
SCORE: A scalable concolic testing tool for reliable embedded software

Kim, Yunho; Kim, Moonzoo, ACM SIGSOFT Foundation of Software Engineering (FSE) Tool demonstration track, pp.420 - 423, ACM SIGSOFT Foundation of Software Engineering (FSE) Tool demonstration track, 2011-09-05

4744
Screenshot identification using combing artifact from interlaced video

Lee, JW; Lee, MJ; Oh, TW; Ryu, SJ; Lee, Heung-Kyu, 12th ACM Multimedia Security Workshop, pp.49 - 54, ACM, 2010-09-09

4745
ScriptFree: Designing Speech Preparation Systems with Adaptive Visual Reliance Control on Script

Oh, Jeungmin; Edge, Darren; Lee, Uichin, 2020 ACM CHI Conference on Human Factors in Computing Systems, CHI EA 2020, Association for Computing Machinery (ACM), 2020-04-25

4746
SCTP-SIP를 이용한 이종망간 이동성 관리 기법

박혜림; 김명철; 이수용; 양기원; 김용호, 한국정보과학회 추계학술대회, pp.187 - 188, 한국정보과학회, 2008

4747
SCV: Structure and constant value based binary diffing

Park, Heewan; Choi, Seokwoo; Seo, Sunae; Han, Taisook, 2nd International Conference on Information Security and Assurance, ISA 2008, pp.32 - 35, IEEE, 2008-04-24

4748
SDH-based ATM 프로토콜 플랫포옴 구현

전종암; 김경수; 박영호; 김대영; 김협종, 대한전자공학회 학술대회, 대한전자공학회, 1993

4749
SDIO에서 RAID 레벨 5의 효율적인 구현

김호진; 황인철; 맹승렬; 윤현수, 한국정보과학회 제31회 춘계 학술대회, pp.64 - 66, 한국정보과학회, 2004-04-23

4750
SDIO에서 RAID-5의 설계 및 구현

김호진; 황인철; 맹승렬; 윤현수, 한국정보과학회 04 봄 학술발표, pp.0 - 0, 한국정보과학회, 2004-04-01

4751
SDIO에서의 디스크 이질성 지원

김호진; 황인철; 김동환; 맹승렬; 윤현수, 한국정보과학회 2004 가을 학술발표, pp.0 - 0, 한국정보과학회, 2004-10

4752
SDN and Pacnet

Chon, Kil Nam, 2nd International Joint Workshop on Computer Communica-tion, 1987

4753
SDN Name Server

전길남, 한국정보과학회 1983년도 가을 학술발표, v.10, no.2, 1983

4754
SDN Status Report

전길남, Proc. of WCCW, 1987

4755
SDN Status Report

전길남, 한국정보과학회 1983년도 가을 학술발표, v.10, no.2, 1985

4756
SDN 웹 인터페이스를 대상으로 한 CSRF 취약점 탐지 방법

위성일; 이현주; 손수엘, 2020 한국정보보호학회 하계학술대회, 한국정보보호학회, 2020-07-15

4757
SDN: A Computer Network for Korean Research Community

Chon, Kil Nam, Proc. of PCCS, pp.567 - 570, 1985

4758
SDN에서 Flow 기반 침입 탐지 시스템의 탐지 성능 개선 방법

이동수; 김광조, CISC-W'14, 한국정보보호학회, 2014-12-06

4759
Seamless handoff scheme for 4G mobile systems based on IP and OFDM

Kim, N.; Choi, H.; Yoon, Hyunsoo, 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security, pp.3315 - 3318, IEEE, 2004-09-26

4760
Seamless mobile robot localization service framework for integrated localization systems

Kang, J.; Kim, Daeyoung; Kim, E.; Kim, Y.; Yoo, S.-E.; Wi, D., 3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008, pp.175 - 179, IEEE, 2008-05-07

4761
Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource Reservation

Lee, Sooyong; Kim, Myungchul; Lee, Kyounghee; Seol, Soonuk; Lee, Gabsoo, 22nd International Conference on Advanced Information Networking and Applications, pp.464 - 471, IEEE, 2008

4762
Search based data sensitivity analysis applied to requirement engineering

Harman, Mark; Krinke, Jens; Ren, Jian; Yoo, Shin, 11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009, pp.1681 - 1688, ACM SIGEVO, 2009-07-10

4763
Search Rays를 이용한 자동화된 3D 심장 세그멘테이션

김석열; 김재일; 박진아, 2008 한국컴퓨터그래픽스학회 하계학술대회, 한국컴퓨터그래픽스학회, 2008-07-07

4764
Searching a room by two guards

Park S.-M.; Lee J.-H.; Chwa, Kyung Yong, v.12, no.4, pp.339 - 352

4765
Searching Animation Models with a Lexical Ontology for Text Animation

Chang, Eunyoung; Park, Jong Cheol, Annual Meetings of the Human Computer Interaction, Human Computer Interaction, 2007-02

4766
Searching for Multi-fault Programs in Defects4J

An, Gabin; Yoon, Juyeon; Yoo, Shin, 13th International Symposium on Search Based Software Engineering, SSBSE 2021, pp.153 - 158, Springer International Publishing, 2021-10-11

4767
SeCGAN: Parallel Conditional Generative Adversarial Networks for Face Editing via Semantic Consistency

Sun, Justin; Bhattarai, Binod; Chen, Zhixiang; Kim, Tae-Kyun, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), AI for Content Creation Workshop, IEEE, CVF, 2022-06-19

4768
Secondary User Games with Spectrum Leasing Market in Cooperative Cognitive Radio Networks

Roh, Heejun; Lee, Sinjae; Lee, Wonjun; Shao, Chenglong; Du, Ding-Zhu, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Communications Society, 2013-04-14

4769
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08

4770
Sector log: Fine-grained storage management for solid state drives

Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21

4771
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage

Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01

4772
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature

Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005

4773
Secure Approach to Deploy RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12

4774
Secure Consolidated Authorization Mechanism for Supply Chain Management

Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001

4775
Secure group communication with multiplicative one-way functions

Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04

4776
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20

4777
Secure In-memory Key-Value Storage with SGX

Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10

4778
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

4779
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

4780
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

4781
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

4782
Secure Storage Service for IaaS Cloud Users

Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14

4783
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks

Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27

4784
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications

Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06

4785
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

4786
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

4787
Securing HB+ against GRS Man-in-the-Middle Attack

Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

4788
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

4789
Security analysis of end-to-end encryption in Telegram

Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26

4790
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem

Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09

4791
Security and Privacy on Authentication Protocol for Low-cost RFID

Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01

4792
Security Challenges for the Ubiquitous Society

윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20

4793
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network

Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25

4794
Security considerations for handover schemes in mobile WiMAX networks

Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31

4795
Security enhancement in ad hoc network with ID-based cryptosystem

Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21

4796
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC

Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18

4797
Security for RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

4798
Security notions for the random oracle model in classical and quantum settings

Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25

4799
See Video : An Interactive Video-on-Demand System Supporting Reliable Streaming of Stored Files

Kang, SI; Song, Junehwa; Lee, Heung-Kyu, Proc. of ACIS Annual Int. Conf. on Computer and Information Science, IEEE, 2002-08

4800
SEED의 차분전력공격에 대한 강화 방안

장화선; 박상배; 김광조, 2003년도 한국정보보호학회 동계학술대회, pp.274 - 280, 한국정보보호학회, 2003-12-06

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0