Conference
|
2020 |
A Scalable Name Lookup Service for NDN
Park Sae Hyong International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1025-1027 |
1 |
원문
|
Journal
|
2019 |
Analysis of Blockchain-based Access Control Technology
Kim Seung-Hyun 전자통신동향분석, v.34, no.4, pp.117-128 |
|
원문
|
Journal
|
2019 |
Approaches for Improving Bloom Filter-Based Set Membership Query
Lee Hyun Yong Journal of Information Processing Systems, v.15, no.3, pp.550-569 |
2 |
원문
|
Conference
|
2017 |
A Collision-Mitigation Hashing Scheme Utilizing Empty Slots of Cuckoo Hash Table
Cho Choong Hee International Conference on Advanced Communication Technology (ICACT) 2017, pp.514-517 |
3 |
원문
|
Journal
|
2016 |
Hash Table with Expanded-Key for High-Speed Networking
신선호 IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750 |
1 |
원문
|
Journal
|
2015 |
Improving Routing Table Lookup in Software Routers
Lee Hyun Yong IEEE Communications Letters, v.19, no.6, pp.957-960 |
8 |
원문
|
Journal
|
2014 |
Performance Analysis of Distributed Mapping System in ID/Locator Separation Architectures
김영현 Journal of Network and Computer Applications, v.39, no.1, pp.223-232 |
4 |
원문
|
Conference
|
2011 |
New mapping system in networks with locator/identifier separation
Jung-Im Kim International Conference on Information and Communication Technology Convergence (ICTC) 2011, pp.733-734 |
0 |
원문
|
Conference
|
2009 |
A New Alignment Algorithm of Fuzzy Fingerprint Vault without Extra Information
Woo Yong Choi International Conference on Artificial Intelligence and Applications (AIA) 2009, pp.197-201 |
|
|
Conference
|
2007 |
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
이성주 International Conference on Adaptive and Natural Computing Algorithms (ICANNGA) 2007 (LNCS 4432), v.4432, pp.432-439 |
15 |
원문
|
Conference
|
2007 |
Performance Enhancement of SIP proxy server by using lhash for matching transaction
Wook Hyun International Conference on Advanced Communication Technology (ICACT) 2007, pp.1290-1293 |
2 |
원문
|
Conference
|
2006 |
Optimizing Hash Table Structure of Flow Exporting Software
Woo-Jin Yang International Conference on Advanced Communication Technology (ICACT) 2006, pp.892-895 |
4 |
|
Journal
|
2005 |
DHT(Distributed Hash Table) 기반 P2P 오버레이 네트워크 보안 위협 분석
Kwon Hyeok Chan 정보보호학회지, v.15, no.6, pp.60-67 |
|
|
Conference
|
2005 |
A Study on Bandwidth Guarantee Method of Subscriber Based DiffServ in Access Network
Park Hea Sook International Conference on High Performance Computing and Communcations (HPCC) 2005 (LNCS 3726), v.3726, pp.93-98 |
0 |
원문
|
Conference
|
2005 |
Extended peer-to-peer protocol based on IPv6
Minji Nam International Conference on Advanced Communication Technology (ICACT) 2005, pp.96-99 |
|
원문
|
Conference
|
2004 |
Extended Peer-to-Peer Protocol based on IPv6
박건우 한국정보과학회 학술 발표 (가을) 2004, pp.682-684 |
|
|