Subjects :
encryption Key
논문 검색결과
Type |
Year |
Title |
Cited |
Download |
Conference
|
2015 |
Architecture Design of Ground Telecommand Encryption Function for Spacecraft
Kim In Jun International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.929-932 |
|
|
Conference
|
2015 |
Cloud based Video Storage System with Privacy Protection
Choi Kang Il International Conference on Advanced Communication Technology (ICACT) 2015, pp.460-463 |
2 |
원문
|
Conference
|
2013 |
A Low Overhead TEK Rekeying Scheme for IPTV CAS over DOCSIS 3.0
Han Seung Koo International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.798-800 |
0 |
원문
|
Conference
|
2013 |
User-Centric Key Management Scheme for Personal Cloud Storage
유성민 International Conference on Information Science and Applications (ICISA) 2013, pp.1-4 |
6 |
원문
|
Conference
|
2011 |
A Privacy Enhanced Contents Sharing in Mobile Networks
김은아 International Conference on Consumer Electronics (ICCE) 2011, pp.729-730 |
0 |
원문
|
Journal
|
2009 |
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
Seung Min Lee IEICE Transactions on Information and Systems, v.E92-D, no.11, pp.2207-2217 |
38 |
원문
|
Conference
|
2009 |
A New Alignment Algorithm of Fuzzy Fingerprint Vault without Extra Information
Woo Yong Choi International Conference on Artificial Intelligence and Applications (AIA) 2009, pp.197-201 |
|
|
Journal
|
2008 |
A Key Management Scheme for IPTV CAS in DOCSIS 3.0 Security System
Han Seung Koo 대한임베디드공학회논문지, v.3, no.4, pp.207-217 |
|
|
Journal
|
2008 |
A Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault
Woo Yong Choi IEICE Electronics Express, v.5, no.18, pp.725-731 |
6 |
원문
|
Conference
|
2007 |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems
Moon Jin Young International Conference on Networks (ICON) 2007, pp.72-76 |
11 |
원문
|
연구보고서 검색결과
Type |
Year |
Research Project |
Primary Investigator |
Download |
No search results. |