41 results on '"Yoon, Hyunsoo"'
Search Results
2. One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks
3. OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication
4. Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network
5. Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network
6. Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree
7. An Efficient Audit Scheme for Cloud Storage
8. Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior
9. Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
10. The Design of a Policy-based Attack-Resilient Intrusion Tolerant System
11. A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS)
12. A Secure Self-Encryption Scheme for Resource Limited Mobile Devices
13. A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks
14. An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks
15. Performance of MCS Selection for Collaborative Hybrid-ARQ Protocol
16. Adaptive Resource Reservation for Efficient Resource Utilization in the Wireless Multimedia Network
17. A New Proxy Signature Scheme Providing Self-delegation
18. Digital Rights Management with Right Delegation for Home Networks
19. Trust Management for Resilient Wireless Sensor Networks
20. Automated Teleoperation of Web-Based Devices Using Semantic Web Services
21. IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput
22. Tamper Resistant Software by Integrity-Based Encryption
23. Accelerating Key Establishment Protocols for Mobile Communication
24. An analysis of punctuated equilibria in simple genetic algorithms
25. New Modular Multiplication Algorithms for Fast Modular Exponentiation
26. A necessary and sufficient condition for proper routing in omega-omega network
27. Multilayer Neural Networks on Distributed-Memory Multiprocessors
28. Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree.
29. Performance analysis of multi-buffered packet-switching networks in multiprocessor systems
30. Handover Optimization for 4G Wireless Networks
31. Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs
32. An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks
33. The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT Systems.
34. A Secure Self-Encryption Scheme for Resource Limited Mobile Devices.
35. A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS).
36. A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
37. Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
38. Digital Rights Management with Right Delegation for Home Networks.
39. A New Proxy Signature Scheme Providing Self-delegation.
40. Automated Teleoperation of Web-Based Devices Using Semantic Web Services.
41. IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.