Search concepts
|
Selected filters
|
- 11,850 - 11,900 out of 85,328 results
Search results
-
Conference contribution
Screening smartphone applications using behavioral signatures
Lee, S., Lee, J. & Lee, H., 2013, Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Proceedings. Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Springer New York LLC, p. 14-27 14 p. (IFIP Advances in Information and Communication Technology; vol. 405).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access6 Citations (Scopus) -
SDN-based distributed mobility management for 5G
Ko, H., Jang, I., Lee, J., Pack, S. & Lee, G., 2017 Mar 29, 2017 IEEE International Conference on Consumer Electronics, ICCE 2017. Sanchez, D. D., Lee, J-H. & Pescador, F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 116-117 2 p. 7889250. (2017 IEEE International Conference on Consumer Electronics, ICCE 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
16 Citations (Scopus) -
Seamless handoff support for real-time applications in the next-generation wireless access network architecture
Lee, S., Jeon, Y., Lim, T. & Park, J., 2009, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009. 4800605. (2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Seamless handover scheme for proxy mobile IPv6 using smart buffering
Choi, H. Y., Kim, K. R., Lee, H. B., Min, S. G. & Han, Y. H., 2008, Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility'08. 67. (Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility'08).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Seamless mobility provisioning by dual cross-linking method in WLAN
Kim, M., Lee, K., Jeon, Y. & Park, J., 2010, ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks. p. 150-154 5 p. 5547230. (ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seamless QoS handling mechanism for macro and micro mobility
Pack, S. & Choi, Y., 2002, Information Networking: Wireless Communications Technologies and Network Applications - International Conference, ICOIN 2002, Revised Papers. Chong, I. (ed.). Springer Verlag, p. 62-73 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2344).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Seamless streaming with intelligent rate determinate algorithm in content centric networks
Kwon, J., Lee, J., Park, H. & Yoo, C., 2014, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 137-138 2 p. 6775942. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Seamless video streaming for video on demand services in vertical handoff
Kim, J. W., Kim, H. S., Yun, J. W., Nam, H. M. & Ko, S. J., 2005, Advances in Mulitmedia Information Processing - PCM 2005 - 6th Pacific Rim Conference on Multimedia, Proceedings. Springer Verlag, p. 71-82 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3768 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Search for dark particles at belle
on behalf of the Belle Collaboration, 2016, Proceedings of the 12th Patras Workshop on Axions, WIMPs and WISPs, PATRAS 2016. Kim, Y., Lindner, A. & Semertzidis, Y. K. (eds.). Verlag Deutsches Elektronen-Synchrotron, p. 145-150 6 p. (Proceedings of the 12th Patras Workshop on Axions, WIMPs and WISPs, PATRAS 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Searching for clues about Maxwell stress in the back-relaxation of ionic polymer-metal composites
Boldini, A., Rosen, M., Cha, Y. & Porfiri, M., 2019, Electroactive Polymer Actuators and Devices (EAPAD) XXI. Bar-Cohen, Y., Anderson, I. A. & Johnson, N. L. (eds.). SPIE, 109661K. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10966).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Search reverse nearest neighbor query on air
Jang, I. & Lee, S-G., 2007, Proceedings - International Conference on Information Technology-New Generations, ITNG 2007. p. 291-296 6 p. 4151699. (Proceedings - International Conference on Information Technology-New Generations, ITNG 2007).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Seat interface pressure characteristics of plegia
Hong, J., Eom, G. M. & Park, B. K., 2008, i-CREATe 2008 - International Convention on Rehabilitation Engineering and Assistive Technology 2008. p. 35-38 4 p. (i-CREATe 2008 - International Convention on Rehabilitation Engineering and Assistive Technology 2008).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Second-harmonic-generation circular dichroism in dielectric nanoantenna dimers
Melik-Gaykazyan, E., Frizyuk, K., Choi, J. H., Petrov, M., Park, H. G. & Kivshar, Y., 2021, CLEO: QELS_Fundamental Science, CLEO: QELS 2021. The Optical Society, FF1A.3. (Optics InfoBase Conference Papers).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Second-Harmonic-Generation Circular Dichroism in Dielectric Nanoantenna Dimers
Melik-Gaykazyan, E., Frizyuk, K., Choi, J. H., Petrov, M., Park, H. G. & Kivshar, Y., 2021 May, 2021 Conference on Lasers and Electro-Optics, CLEO 2021 - Proceedings. Institute of Electrical and Electronics Engineers Inc., (2021 Conference on Lasers and Electro-Optics, CLEO 2021 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Second-harmonic spectroscopy with structured beams and the observation of quasi-BIC modes in all-dielectric nanoresonators
Melik-Gaykazyan, E. V., Koshelev, K., Choi, J. H., Kruk, S., Park, H. G. & Kivshar, Y., 2019, AOS Australian Conference on Optical Fibre Technology, ACOFT 2019 and Australian Conference on Optics, Lasers, and Spectroscopy, ACOLS 2019. Mitchell, A. & Rubinsztein-Dunlop, H. (eds.). SPIE, 1120007. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 11200).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Second order inverse born approximation for diffuse optical tomography
Kwon, K. & Kim, B. M., 2008, Multimodal Biomedical Imaging III. 68500U. (Progress in Biomedical Optics and Imaging - Proceedings of SPIE; vol. 6850).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL
Lee, E., Chang, D., Kim, J., Sung, J. & Hong, S., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 189-206 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
14 Citations (Scopus) -
Secrecy analysis of purchase transaction in electronic purses
Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I. & Choi, J. Y., 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 979-984 6 p. 1620313. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secrecy outage minimization for wireless powered communication networks with an energy harvesting jammer
Moon, J., Lee, H., Song, C. & Lee, I., 2016, 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7842246. (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Citations (Scopus) -
Secure and efficient capability-based power management in the smart grid
Seo, D., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 119-126 8 p. 5951960. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
31 Citations (Scopus) -
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage
Koo, D., Hur, J. & Yoon, H., 2014, Frontier and Innovation in Future Computing and Communications. Zomaya, A., Park, J. J., Jeong, H-Y. & Obaidat, M. (eds.). Springer Verlag, p. 229-235 7 p. (Lecture Notes in Electrical Engineering; vol. 301).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Secure and efficient ID-based group key agreement fitted for Pay-TV
Kim, H., Nam, J., Kim, S. & Won, D., 2005, Advances in Mulitmedia Information Processing - PCM 2005 - 6th Pacific Rim Conference on Multimedia, Proceedings. Springer Verlag, p. 117-128 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3768 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Citations (Scopus) -
Secure and efficient password-based authenticated key exchange protocol for two-server architecture
Jun, H. L. & Dong, H. L., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 2102-2107 6 p. 4420564. (2007 International Conference on Convergence Information Technology, ICCIT 2007).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security
Lee, J. & Lee, H., 2021, ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings. Jøsang, A., Futcher, L. & Hagen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 287-301 15 p. (IFIP Advances in Information and Communication Technology; vol. 625).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure data deduplication with dynamic ownership management in cloud storage (Extended abstract)
Hur, J., Koo, D., Shin, Y. & Kang, K., 2017 May 16, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society, p. 69-70 2 p. 7929937. (Proceedings - International Conference on Data Engineering).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Secure device-to-device authentication in mobile multi-hop networks
Kwon, H., Hahn, C., Kim, D., Kang, K. & Hur, J., 2014, Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Cai, Z., Wang, C., Cheng, S., Wang, H. & Gao, H. (eds.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8491).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
17 Citations (Scopus) -
Secure Mobile RFID system against privacy and security problems
Il, J. K., Eun, Y. C. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 67-72 6 p. 4279773. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
13 Citations (Scopus) -
Secure mutual authentication and fair billing for roaming service in wireless mobile networks
Im, T. R., Lee, H., Cho, K. T. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 466-471 6 p. 4682285. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Citations (Scopus) -
Secure password pocket for distributed web services
Koo, J. H. & Lee, D. H., 2005, Network and Parallel Computing - IFIP International Conference, NPC 2005, Proceedings. p. 327-334 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3779 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secure pattern-based authentication against shoulder surfing attack in smart devices
Shin, H., Kim, D. & Hur, J., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 13-18 6 p. 7182486. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Secure signed radix-r recoding methods for constrained-embedded devices
Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure similarity search
Park, H. A., Kim, B. H., Lee, D. H., Chung, Y. D. & Zhan, J., 2007, Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007. p. 598-604 7 p. 4403170. (Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
33 Citations (Scopus) -
Secure vehicular communication for safety applications - A measurement study
Juhong, M., Jihun, H., Sangki, Y., Inhye, K. & Hyogon, K., 2008, 2008 IEEE 67th Vehicular Technology Conference-Spring, VTC. p. 3016-3020 5 p. 4525879. (IEEE Vehicular Technology Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networks
Park, B. N., Lee, W. & Shin, C., 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security analysis and implementation leveraging globally networked RFIDs
Park, N., Kim, S., Won, D. & Kim, H., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 494-505 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access30 Citations (Scopus) -
Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses
Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security Analysis of One-step QSDC Protocol with Hyperentanglement
Kim, K., Kim, B. & Heo, J., 2022, APWCS 2022 - 2022 IEEE VTS Asia Pacific Wireless Communications Symposium. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. (APWCS 2022 - 2022 IEEE VTS Asia Pacific Wireless Communications Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security analysis of RFID authentication for pervasive systems using model checking
Kim, H. S., Oh, J. H. & Choi, J. Y., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Security analysis of smart card based password authentication schemes
Kim, H. S., Seo, S. & Choi, J. Y., 2010, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807. (Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security analysis of the keyschedule of ARIA-128
Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security analysis on commercial online music streaming service and countermeasures
Lee, S., Choi, D., Won, D. & Kim, S., 2010, Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 10. p. 408-414 7 p. (Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication ICUIMC 10).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security analysis on the authentication mechanisms of Korean popular messengers
Shin, D., Choi, Y., Lee, Y., Park, S., Kim, S. & Won, D., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 547-552 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access1 Citation (Scopus) -
Security and handover designs for VoWLAN system
Kim, M. Y., Lim, M., Sohn, J. S. & Lee, D. H., 2007, Managing Next Generation Networks and Services - 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Proceedings. Springer Verlag, p. 447-456 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4773 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security and privacy analysis of RFID authentication protocol for ubiquitous computing
Kim, H. S. & Choi, J. Y., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 1359-1363 5 p. 4318010. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security and privacy analysis of RFID systems using model checking
Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security assessment for application network services using fault injection
Kang, H. & Lee, D. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 172-183 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security authentication for U-health application services
Ahn, B. H., Hong, J. & Lee, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security considerations for handover schemes in mobile WiMAX networks
Hur, J., Shim, H., Kim, P., Yoon, H. & Song, N. O., 2008, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2531-2536 6 p. 4489476. (IEEE Wireless Communications and Networking Conference, WCNC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
34 Citations (Scopus) -
Security engineering methodology for developing secure enterprise information systems: An overview
Kim, Y. G. & Cha, S., 2012, Embedded and Multimedia Computing Technology and Service, EMC 2012. p. 393-400 8 p. (Lecture Notes in Electrical Engineering; vol. 181 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security enhancing compiler for localization schemes in pervasive sensor networks
Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880. (Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution