Search

Your search keyword '"Dooho Choi"' showing total 26 results

Search Constraints

Start Over You searched for: Author "Dooho Choi" Remove constraint Author: "Dooho Choi" Topic computer.software_genre Remove constraint Topic: computer.software_genre
26 results on '"Dooho Choi"'

Search Results

1. Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security

2. Secure IoT Device Authentication Scheme using Key Hiding Technology

3. Is It Possible to Hide My Key into Deep Neural Network?

4. Security Enhancement for IoT Device using Physical Unclonable Functions

5. Protecting secret keys in networked devices with table encoding against power analysis attacks

6. An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation

7. A Solution for Reducing Redistribution Costs of HAIL

8. Data Preprocessor for Order Preserving Encryption

9. New efficient batch verification for an identity-based signature scheme

10. Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system

11. A Security Framework for a Drone Delivery Service

12. Security Analysis on RFID Mutual Authentication Protocol

13. Information Security Applications

14. Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem

15. A distributed file system over unreliable network storages

16. Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis

17. Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

18. Secure Cryptographic Module Implementation and Mathematics

19. Privacy-preserving cross-user source-based data deduplication in cloud storage

20. Enforcing security in mobile RFID networks multilateral approaches and solutions

21. Security Management System for Sensor Network

22. RFID Stamp with RFID Passive Reader

23. Product Authentication Service of Consumer's mobile RFID Device

24. A secure mobile IP authentication based on identification protocol

25. Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Handoff

26. Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography

Catalog

Books, media, physical & digital resources