Journal
|
2024 |
Enhancing digital twin efficiency in indoor environments: Virtual sensor-driven optimization of physical sensor combinations
Shin Hak Jong Automation in Construction, v.161, pp.1-15 |
7 |
원문
|
Journal
|
2023 |
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Jong-Heon Lee IET Information Security, v.17, no.1, pp.46-65 |
6 |
원문
|
Conference
|
2021 |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction
Jong-Heon Lee International Conference on Information Security and Cryptology (ICISC) 2021 (LNCS 13218), pp.368-391 |
0 |
원문
|
Journal
|
2019 |
4D digital tomosynthesis image reconstruction using brute force-based adaptive total variation (BF-ATV) in a prototype LINAC system
최성훈 Physics in Medicine & Biology, v.64, no.9, pp.1-15 |
6 |
원문
|
Conference
|
2015 |
Hybrid-Type Secure Deduplication
Keonwoo Kim International Conference on Internet (ICONI) 2015, pp.143-145 |
|
|
Journal
|
2015 |
Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES
Lee Seung Kwang ETRI Journal, v.37, no.5, pp.1012-1022 |
13 |
원문
|
Conference
|
2015 |
Privacy Preserving Client-side Deduplication scheme in Cloud Storage
박철희 Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2015, pp.141-147 |
|
|
Journal
|
2015 |
Estimating Korean Residence Registration Numbers from Public Information on SNS
Choi Dae Seon IEICE Transactions on Communications, v.E98.B, no.4, pp.565-574 |
2 |
원문
|
Conference
|
2012 |
Distributed Password Cracking on GPU Nodes
Keonwoo Kim International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.647-650 |
|
|
Journal
|
2011 |
Privacy-Preserving H.264 Video Encryption Scheme
Choi Sugil ETRI Journal, v.33, no.6, pp.935-944 |
11 |
원문
|
Conference
|
2011 |
A Lightweight and Stable Authentication Method for the Internet Access Control in Smartphones
유성민 International Conference on Informatics Engineering and Information Science (ICIEIS) 2011 (CCIS 251), v.251, pp.331-342 |
1 |
원문
|
Journal
|
2011 |
GPU-Accelerated Password Cracking of PDF Files
Keonwoo Kim KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2235-2253 |
9 |
원문
|
Journal
|
2011 |
Fingerprint Template Protection Using One-Time Fuzzy Vault
Woo Yong Choi KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2221-2234 |
2 |
원문
|
Conference
|
2011 |
Fast Polynomial Reconstruction Attack against Fuzzy Fingerprint Vault
Woo Yong Choi International Conference on New Trends in Information Science and Service Science (NISS) 2011, pp.299-302 |
|
|
Journal
|
2011 |
Dynamic Time Warping-based K-Means Clustering for Accelerometer-based Handwriting Recognition
Minsu Jang Studies in Computational Intelligence, v.363, pp.21-26 |
5 |
원문
|
Conference
|
2010 |
Security Enhancement of Fuzzy Fingerprint Vault Using One-Time Templates
Woo Yong Choi International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2 |
|
|
Journal
|
2008 |
A Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault
Woo Yong Choi IEICE Electronics Express, v.5, no.18, pp.725-731 |
6 |
원문
|