Browsing byTitle

Jump to:
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 33741 to 33760 of 84357

Issue DateTitleAuthor(s)Type
2008Secure authentication and management scheme for RFID조동섭; 서대희Conference Paper
2015Secure Authentication for Structured Smart Grid System채기준; 도인실Conference Paper
2019Secure Circuit with Low-power On-chip Temperature Sensor for Detection of Temperature Fault Injection Attacks김지훈Article; Proceedings Paper
2018Secure circuit with optical energy harvesting against unpowered physical attacks김지훈Article
2011Secure code dissemination using energy-efficient minimal virtual backbone in sensor networks채기준Conference Paper
2003Secure firewall traversal in Mobile IP network채기준Article
2021Secure Fully Homomorphic Authenticated Encryption윤아람Article
2021Secure IC with countermeasure to unpowered physical attack using on-chip photodiode and charge pump김지훈Conference Paper
2019Secure Integrated Circuit with Physical Attack Detection based on Reconfigurable Top Metal Shield김지훈Article
2018Secure medical image-sharing mechanism based on visual cryptography in EHR system채기준; 도인실Conference Paper
2007Secure mobile content delivery using dynamic group key agreement with batch verification조동섭Conference Paper
2009Secure RFID authentication scheme for EPC Class Gen2조동섭; 서대희Conference Paper
2014Secure U-healthcare service based on wireless sensor network채기준; 도인실Article
2008Secure user identification for consumer electronics devices이상호; 반효경Article
2016Securing information flow in content delivery networks with visual and quantum cryptography채기준; 도인실Conference Paper
2006Security analysis and improvement for key issuing schemes in ID-based cryptography이상호Article; Proceedings Paper
2006Security analysis and improvement for key issuing schemes in ID-based cryptography이상호Conference Paper
2017Security analysis of a certificateless signature from lattices이향숙; 이주희; 장승환Article
2007Security analysis of authenticated key exchange protocol based on the q-th root problem심경아Conference Paper
2005Security analysis of password-authenticated key agreement protocols심경아Conference Paper

BROWSE