Browse "School of Computing(전산학부)" by Type Conference

Showing results 4761 to 4780 of 7376

4761
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08

4762
Sector log: Fine-grained storage management for solid state drives

Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21

4763
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage

Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01

4764
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature

Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005

4765
Secure Approach to Deploy RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12

4766
Secure Consolidated Authorization Mechanism for Supply Chain Management

Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001

4767
Secure group communication with multiplicative one-way functions

Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04

4768
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20

4769
Secure In-memory Key-Value Storage with SGX

Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10

4770
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

4771
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

4772
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

4773
Secure One-way Mobile Payment System Keeping Low Computation in Mobile Devices

Ham, W; Choi, H; Xie, Y; Lee, M; Kim, Kwangjo, WISA2002, pp.287 - 301, WISA, 2002-08-01

4774
Secure Storage Service for IaaS Cloud Users

Seol, Jin Ho; Jin, Seongwook; Maeng, SeungRyoul, The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), pp.190 - 191, IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and ACM, 2013-05-14

4775
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks

Dwijaksara, Made Harta; Chung, Doyoung; Park, Yi Jae; Kim, Jangseong; Kim, Kwang-Jo, SCIS2011, SCIS, 2011-01-27

4776
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications

Woo, Sungpil; Ha, Jaehee; Byun, Jaewook; Kwon, Kiwoong; Tolcha, Yalew; Kang, Daeyoun; Nguyen, Hoang Minh; et al, 13th IEEE World Congress on Services, SERVICES 2017, pp.40 - 43, Institute of Electrical and Electronics Engineers Inc., 2017-06

4777
Securing AES against Second-Order DPA by simple Fixed-Value Masking

Kim, Kwangjo; Chang, H, CSS2003, pp.145 - 150, 2003-10

4778
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

4779
Securing HB+ against GRS Man-in-the-Middle Attack

Duc, DN; Kim, K, Proc. Of SCIS 2007, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01

4780
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0