Journal
|
2024 |
Overview of RIS-enabled secure transmission in 6G wireless networks
Jungsook Bae Digital Communications and Networks, v.10, no.6, pp.1553-1565 |
14 |
원문
|
Journal
|
2024 |
Overview of RIS-enabled secure transmission in 6G wireless networks
Waqas Khalid Digital Communications and Networks, v.10, no.6, pp.1553-1565 |
14 |
원문
|
Journal
|
2024 |
Practical Abandoned Object Detection in Real-World Scenarios: Enhancements Using Background Matting with Dense ASPP
정민구 IEEE Access, v.12, pp.60808-60825 |
1 |
원문
|
Journal
|
2024 |
Deep Reinforcement Learning-Empowered Cost-Effective Federated Video Surveillance Management Framework
Dilshod Bazarov Ravshan Ugli Sensors, v.24, no.7, pp.1-19 |
0 |
원문
|
Conference
|
2021 |
Impacts of Cluster Architecture on Security and Performance of UAV-assisted Wireless Sensor Networks
Wang/Kicheoul International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1519-1524 |
0 |
원문
|
Conference
|
2018 |
Study on Intel CPU-FPGA Architecture : Security Perspective
Lee Jinyong International SoC Design Conference (ISOCC) 2018, pp.52-53 |
1 |
원문
|
Conference
|
2017 |
Towards Protected Firmware Verification in Low-power Devices
Moon Yong Hyuk International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017, pp.177-179 |
|
|
Journal
|
2016 |
One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis
Lee Seung Kwang IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E99.A, no.10, pp.1833-1842 |
1 |
원문
|
Conference
|
2015 |
Supporting a Variety of Secure Services Based on MTM
Yoon Seung Yong International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 |
|
|
Conference
|
2015 |
Trusted Military Services Based on the Secure Domain of the Mobile Security Solution
Kim Geon Lyang International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131 |
|
|
Conference
|
2015 |
Improving MTM-Based Session & Key Management
Yoon Seung Yong International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334 |
|
|
Conference
|
2012 |
Privacy-Preserving Cross-User Source-Based Data Deduplication in Cloud Storage
Lee Seung Kwang International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.329-330 |
33 |
원문
|
Conference
|
2008 |
MYTV 2.0: Semantic reasoning and Web 2.0 for mobile TV
Kim Ju Han International Symposium on Consumer Electronics (ISCE) 2008, pp.1-4 |
7 |
원문
|
Conference
|
2006 |
Performance of an Efficient Performing Authentication to Obtain Access to Public Wireless LAN with a Cache Table
Hyun-Woo Lee International Conference on Communications (ICC) 2006, pp.2376-2381 |
1 |
원문
|
Conference
|
2005 |
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device
Lee Byung-Gil International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.469-475 |
1 |
원문
|
Conference
|
2004 |
Design and Implementation of Detection Engine Against IDS Evasion with Unicode
Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 |
|
원문
|