Search

Your search keyword '"Mun-Kyu Lee"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Mun-Kyu Lee" Remove constraint Author: "Mun-Kyu Lee" Topic business Remove constraint Topic: business
43 results on '"Mun-Kyu Lee"'

Search Results

1. Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading

2. Predicting Regional Outbreaks of Hepatitis A Using 3D LSTM and Open Data in Korea

3. Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients

4. Fast Verification of Signatures With Shared ECQV Implicit Certificates

5. Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification

6. Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption

7. Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption

8. Low-Complexity Elliptic Curve Cryptography Processor Based on Configurable Partial Modular Reduction Over NIST Prime Fields

9. Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

10. Outbreak Prediction of Hepatitis A in Korea based on Statistical Analysis and LSTM Network

11. Privacy-Preserving Electricity Billing System Using Functional Encryption

12. Analysis and Improvement on a Unimodal Haptic PIN-Entry Method

13. Design and Analysis of Efficient Parallel Hardware Prime Generators

14. Security Analysis and Improvement of Fingerprint Authentication for Smartphones

15. Transaction authentication using complementary colors

16. Analysis and Improvement of MaTRU Public Key Cryptosystem

17. Reordering computation sequences for memory-efficient binary field multiplication

18. Efficacy and safety of glimepiride/metformin sustained release once daily vs. glimepiride/metformin twice daily in patients with type 2 diabetes

19. Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication

20. Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption

21. Low-Power Design of Hardware One-Time Password Generators for Card-Type OTPs

22. Integrated circuit design for physical unclonable function using differential amplifiers

23. Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem

24. Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

25. Design and Performance Analysis of Electronic Seal Protection Systems Based on AES

26. Vulnerability Analysis on Smartphone Fingerprint Templates

27. Efficient parallel exponentiation in using normal basis representations

28. 3DPIN: Enhancing security with 3D display

30. Secure and Usable PIN-Entry Method with Shoulder-Surfing Resistance

31. Easy authentication using smart phones and 2-D barcodes

32. Secure and user friendly PIN entry method

33. User Authentication Based on Distance Estimation Using Ultrasonic Sensors

34. 2015 Korean Guidelines for the Management of Dyslipidemia: Executive Summary (English Translation)

35. Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols

36. Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri’s Message Authentication Scheme

37. Sliding Window Method for NTRU

38. Cryptanalysis of Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme

39. New Variant of the Self-Shrinking Generator and Its Cryptographic Properties

40. Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m )

41. SPA-Resistant Simultaneous Scalar Multiplication

42. Design and Implementation of Crypto Co-processor and Its Application to Security Systems

43. Comments on 'Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation'

Catalog

Books, media, physical & digital resources