Showing results 4781 to 4800 of 7376
Security analysis of end-to-end encryption in Telegram Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-26 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
Security and Privacy on Authentication Protocol for Low-cost RFID Yang, J; Ren, K; Kim, Kwangjo, SCIS, pp.0 - 0, Institute of Electronics, Information and Communication Engineers, 2005-01 |
Security Challenges for the Ubiquitous Society 윤찬엽; 김광조; 인소란, 한국정보보호학회 영남지부 학술대회, 한국정보보호학회, 2004-02-20 |
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network Aminanto Muham; 김광조, CISC-S'15, 한국정보보호학회, 2015-06-25 |
Security considerations for handover schemes in mobile WiMAX networks Hur, J.; Shim, H.; Kim, P.; Yoon, Hyunsoo; Song, NO, IEEE Wireless Communications and Networking Conference, WCNC 2008, pp.2531 - 2536, IEEE, 2008-03-31 |
Security enhancement in ad hoc network with ID-based cryptosystem Song, J.; Kim, H.; Lee, S.; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.372 - 376, Springer Verlag (Germany), 2005-02-21 |
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC Vo, D.-L.; Kim, Kwangjo, 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pp.144 - 147, IEEE, 2007-09-18 |
Security for RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Kwangjo, Symposium on Cryptography and Information Security, pp.23 - 26, Institute of Electronics, Information and Communication Engineers, 2007-01 |
Security notions for the random oracle model in classical and quantum settings Lee, Jeeun; Lee, Seunghyun; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
See Video : An Interactive Video-on-Demand System Supporting Reliable Streaming of Stored Files Kang, SI; Song, Junehwa; Lee, Heung-Kyu, Proc. of ACIS Annual Int. Conf. on Computer and Information Science, IEEE, 2002-08 |
SEED의 차분전력공격에 대한 강화 방안 장화선; 박상배; 김광조, 2003년도 한국정보보호학회 동계학술대회, pp.274 - 280, 한국정보보호학회, 2003-12-06 |
Seeing is slicing: Observation based slicing of picture description languages Yoo, Shin; Binkley, David; Eastman, Roger, 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, pp.175 - 184, Institute of Electrical and Electronics Engineers Inc., 2014-09-29 |
SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments Kang, Seungwoo; Lee, Jinwon; Jang, Hyukjae; Lee, Hyonik; Lee, Youngki; Park, Souneil; Park, Taiwoo; et al, 6th International Conference on Mobile Systems, Applications, and Services, pp.267 - 280, Association for Computing Machinery (ACM), 2008-06-17 |
Seg&Struct: The Interplay Between Part Segmentation and Structure Inference for 3D Shape Parsing Kim, Jeonghyun; Mo, Kaichun; Sung, Minhyuk; Woo, Woontack, 23rd IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2023, pp.1226 - 1235, Institute of Electrical and Electronics Engineers Inc., 2023-01 |
SEGFUZZ: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing Jeong, Dae R; Lee, Byoungyoung; Shin, Insik; Kwon, Youngjin, 44th IEEE Symposium on Security and Privacy, SP 2023, IEEE, 2023-05-23 |
Segmental Confidence Weighting for Recognition of Partly Contaminated Speech Cho, HY; Kim, LY; Oh, Yung-Hwan, Proc. ICSP, pp.643 - 648, ICSP, 2001-08 |
Segmental-feature HMM using parametric trajectory model Yun, YS; Oh, Yung-Hwan, 2000 IEEE Interntional Conference on Acoustics, Speech, and Signal Processing, v.3, pp.1249 - 1252, 2000-06-05 |
Segmentation Method of Handwritten Characters for Digitalizing Korean Historical Documents Kim, M; Cho, K; Kwag, H; Kim, JinHyung, 6th international Conference on Document Analysis Systems, v.0, no.0, pp.114 - 124, The 6th international Conference on Document Analysis Systems, Florence, 2004 |
Sego: Pervasive trusted metadata for efficiently verified untrusted system services Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, 21st International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2016, pp.277 - 290, ACM SIGARCH, SIGOPS, SIGPLAN, 2016-04-06 |
Discover