Showing results 1 to 16 of 16
A Fragile Watermakring Scheme For Binary Image Authentication using Hamming Code Lee, Y; Kim, H; Park, Y; Chung, B; Yoon, Hyunsoo, 6th Asia Pacific International Symposium on Information Technology, pp.445 - 448, IEEE, 2007-01 |
A Haptic Enhancement Surgery Simulator with a Dual Model Kim, Y; Lee, Y; Park, Jinah; Kim, S, 4th SPENALO International Symposium on Marin and Medical Robotics (SIS 2012), SPENALO, KITECH, 2012-09-07 |
A new binary image authentication scheme with small distortion and low false negative rates Lee, Y; Hur, J; Kim, H; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.3259 - 3262, 2007-11 |
A new proxy signature scheme providing self-delegation Lee, Y; Kim, H; Park, Y; Yoon, Hyunsoo, ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.328 - 342, Springer Verlag (Germany), 2006-11-30 |
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 |
Adaptive cross-channel interference cancelation on blind signal outputs using source absence/presence detection and spectral subtraction Jang, GJ; Choi, C; Lee, Y; Oh, Yung-Hwan, ICSLP2004-INTERSPEECH, pp.IV-2865 - 2868, 2004 |
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks Yoon, Hyunsoo; Lee, Y; Kim, H; Chung, B; Park, Y, The International Conference on Information Networking 2007, pp.445 - 448, 2007-01-23 |
Group Context-aware Service Discovery for Supporting Continuous Service Availability Kang, S; Kim, W; Lee, DongMan; Lee, Y, ubiPCMM'05, pp.62 - 63, 2005-09 |
Hardware Stack Design Towards an Effective Defense Against From Pointer Overwriting Attacks Yoon, Hyunsoo; Park, Y; Lee, Y; Kim, H; Lee, GJ; Kim, IH, The 1th International Workshop on Security (IWSEC'06) - LNCS, pp.268 - 277, 2006-09-23 |
Multimedia Handling and Storage Whang, Kyu-Young; Moon, S; Lee, Y; Kim, M, Int’l Workshop on Intelligent Computer, pp.259 - 271, 1990-11 |
Reactive key management scheme for access control in group communications Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04 |
Table Driven Proportional Access based Real-Time Ethernet Kim, Daeyoung; Doh , Y; Lee, Y, PRDC'01, pp.0 - 0, 2001-12 |
The Clustering Property of Corner Transformation for Spatial Databases Song, J; Whang, Kyu-Young; Lee, Y; Kim, S, pp.0 - 0, 1999-10-25 |
Trust-Based Secure Aggregation in Wireless Sensor Networks Hur, J; Lee, Y; Hong, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.1 - 6, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07 |
Weakness of the Synchro-Difference LKH scheme for secure multicast Kim, H; Chung, B; Lee, Y; Park, Y; Yoon, Hyunsoo, IEEE COMMUNICATIONS LETTERS, v.11, no.9, pp.765 - 767, 2007-09 |
(Undefined) |
Discover