38 results on '"Dooho Choi"'
Search Results
2. T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction.
3. Secure IoT Device Authentication Scheme using Key Hiding Technology.
4. PUF-based Authentication Scheme for IoT Devices.
5. RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices.
6. Is It Possible to Hide My Key into Deep Neural Network?
7. Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices.
8. Security Enhancement for IoT Device using Physical Unclonable Functions.
9. PUF based IoT Device Authentication Scheme.
10. Implementing a phase detection ring oscillator PUF on FPGA.
11. Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver.
12. A Security Framework for a Drone Delivery Service.
13. The study of document filter for smart device.
14. A distributed file system over unreliable network storages.
15. An Improved Masking Scheme for S-Box Software Implementations.
16. Security Analysis on RFID Mutual Authentication Protocol.
17. Function Masking: A New Countermeasure Against Side Channel Attack.
18. Inter-vessel traffic service data exchange format protocol security enhancement of user authentication scheme in mobile VTS middleware platform.
19. Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT.
20. A new fault cryptanalysis on montgomery ladder exponentiation algorithm.
21. Enforcing security in mobile RFID networks multilateral approaches and solutions.
22. Privacy-preserving cross-user source-based data deduplication in cloud storage.
23. Security-enhanced key establishment schemes using network coding.
24. A practical analysis of fault attack countermeasure on AES using data masking.
25. Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT.
26. Fault resistant CRT-RSA scheme adopting a small exponent.
27. Fault attack for the iterative operation of AES S-Box.
28. Convolutive Noise Filtering in Power Analysis on Smartcards Using the Cepstrum.
29. esGate: Secure embedded gateway system for a wireless sensor network.
30. RFID Stamp with RFID Passive Reader.
31. Security Management System for Sensor Network.
32. Product Authentication Service of Consumer's mobile RFID Device.
33. Excellent resistance switching characteristics of Pt/SrTiO/sub 3/ schottky junction for multi-bit nonvolatile memory application.
34. Resistance switching of Al doped ZnO for Non Volatile Memory applications.
35. Reversible resistance switching of the non-stoichiometric ZrO/sub x/ and SrTiO/sub x/ for non-volatile memory applications.
36. Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers
37. Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers
38. 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.