Browse "School of Computing(전산학부)" by Author Lee, Y

Showing results 1 to 16 of 16

1
A Fragile Watermakring Scheme For Binary Image Authentication using Hamming Code

Lee, Y; Kim, H; Park, Y; Chung, B; Yoon, Hyunsoo, 6th Asia Pacific International Symposium on Information Technology, pp.445 - 448, IEEE, 2007-01

2
A Haptic Enhancement Surgery Simulator with a Dual Model

Kim, Y; Lee, Y; Park, Jinah; Kim, S, 4th SPENALO International Symposium on Marin and Medical Robotics (SIS 2012), SPENALO, KITECH, 2012-09-07

3
A new binary image authentication scheme with small distortion and low false negative rates

Lee, Y; Hur, J; Kim, H; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.3259 - 3262, 2007-11

4
A new proxy signature scheme providing self-delegation

Lee, Y; Kim, H; Park, Y; Yoon, Hyunsoo, ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.328 - 342, Springer Verlag (Germany), 2006-11-30

5
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

6
Adaptive cross-channel interference cancelation on blind signal outputs using source absence/presence detection and spectral subtraction

Jang, GJ; Choi, C; Lee, Y; Oh, Yung-Hwan, ICSLP2004-INTERSPEECH, pp.IV-2865 - 2868, 2004

7
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks

Yoon, Hyunsoo; Lee, Y; Kim, H; Chung, B; Park, Y, The International Conference on Information Networking 2007, pp.445 - 448, 2007-01-23

8
Group Context-aware Service Discovery for Supporting Continuous Service Availability

Kang, S; Kim, W; Lee, DongMan; Lee, Y, ubiPCMM'05, pp.62 - 63, 2005-09

9
Hardware Stack Design Towards an Effective Defense Against From Pointer Overwriting Attacks

Yoon, Hyunsoo; Park, Y; Lee, Y; Kim, H; Lee, GJ; Kim, IH, The 1th International Workshop on Security (IWSEC'06) - LNCS, pp.268 - 277, 2006-09-23

10
Multimedia Handling and Storage

Whang, Kyu-Young; Moon, S; Lee, Y; Kim, M, Int’l Workshop on Intelligent Computer, pp.259 - 271, 1990-11

11
Reactive key management scheme for access control in group communications

Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04

12
Table Driven Proportional Access based Real-Time Ethernet

Kim, Daeyoung; Doh , Y; Lee, Y, PRDC'01, pp.0 - 0, 2001-12

13
The Clustering Property of Corner Transformation for Spatial Databases

Song, J; Whang, Kyu-Young; Lee, Y; Kim, S, pp.0 - 0, 1999-10-25

14
Trust-Based Secure Aggregation in Wireless Sensor Networks

Hur, J; Lee, Y; Hong, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.1 - 6, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07

15
Weakness of the Synchro-Difference LKH scheme for secure multicast

Kim, H; Chung, B; Lee, Y; Park, Y; Yoon, Hyunsoo, IEEE COMMUNICATIONS LETTERS, v.11, no.9, pp.765 - 767, 2007-09

16(Undefined)

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0