Search

Your search keyword '"Kyung Ryu"' showing total 44 results

Search Constraints

Start Over You searched for: Author "Kyung Ryu" Remove constraint Author: "Kyung Ryu" Topic computer.software_genre Remove constraint Topic: computer.software_genre
44 results on '"Kyung Ryu"'

Search Results

1. Convergence Interaction for Communication

2. Machine Learning-Based Fast Angular Prediction Mode Decision Technique in Video Coding

3. Delegation Based User Authentication Framework over Cognitive Radio Networks

5. Recent trends in convergence-based smart healthcare service

6. A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards

7. Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs

8. Bio-Interactive Healthcare Service System Using Lifelog Based Context Computing

9. Simple approach in HACCP for evaluating the risk level of hazards using probability distributions

10. KCI-resilient anonymous wireless link-layer authentication protocols

11. Health Information Monitoring System using Context Sensors based Band

12. Customer Relation Management Application using Associative Mining

13. Contents Recommendation Search System using Personalized Profile on Semantic Web

14. On Elliptic Curve Based Untraceable RFID Authentication Protocols

15. On the security of efficient user identification scheme

16. Cryptanalysis and further improvement of Peinado’s improved LHL-key authentication scheme

17. Improvement of Fan et al.’s deniable authentication protocol based on Diffie–Hellman algorithm

18. Security of Tseng–Jan’s conference key distribution system

19. Improvement of Chien–Jan’s authenticated multiple-key agreement protocol without using conventional one-way function

20. Fixing problems in Lin et al.’s OSPA protocol

21. Cryptanalysis of Lee–Lee authenticated key agreement scheme

22. An improvement of Hwang–Lee–Tang's simple remote user authentication scheme

23. A secure user authentication scheme using hash functions

24. Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards

25. Design of Portable Healthcare Gateway for Patient with Chronic Disease

26. Efficient remote user authentication scheme based on generalized elgamal signature scheme

27. Further improvement of an efficient password based remote user authentication scheme using smart cards

28. Evolutionary Bio-Interaction Knowledge Accumulation for Smart Healthcare

29. More Robust Anonymous Authentication with Link-Layer Privacy

30. Design of Ubiquitous Music Recommendation System Using MHMM

31. Analysis of database performance with dynamic locking

32. Efficient Conjunctive Keyword-Searchable Encryption

33. Secure Protected Password Change Scheme

34. Security of ZLYH-key authentication scheme

35. An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack

36. Security of Shen et al.’s Timestamp-Based Password Authentication Scheme

37. Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing

38. An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings

39. Robust Remote User Authentication Scheme

40. A Promising Key Agreement Protocol

41. Performance analysis of centralized databases with optimistic concurrency control

42. Analysis of some optimistic concurrency control schemes based on certification

43. A decomposition solution to the queueing network model of the centralized DBMS with static locking

44. A simple key agreement protocol

Catalog

Books, media, physical & digital resources