8 results on '"Junbeom Hur"'
Search Results
2. Downgrading Backward Privacy of Searchable Encryption.
3. Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events.
4. Neural Network Stealing via Meltdown.
5. Cache Side-Channel Attack on Mail User Agent.
6. Password typos resilience in honey encryption.
7. Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications.
8. An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.