33 results on '"Lee, Sokjoon"'
Search Results
2. Quantum Circuit Construction
3. VulnHunt-GPT: a Smart Contract vulnerabilities detector based on OpenAI chatGPT
4. $$T{-}depth$$ Reduction Method for Efficient $$SHA{-}256$$ Quantum Circuit Construction
5. OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication
6. Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks
7. Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
8. ARdetector: android ransomware detection framework
9. Hybrid approach of parallel implementation on CPU–GPU for high-speed ECDSA verification
10. EFFNet-CA: An Efficient Driver Distraction Detection Based on Multiscale Features Extractions and Channel Attention Mechanism
11. Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks
12. OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication
13. Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
14. Degree-Based Entropy Descriptors of Graphenylene Using Topological Indices
15. Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU
16. T‐depth reduction method for efficient SHA‐256 quantum circuit construction
17. Group signatures with controllable linkability for dynamic membership
18. Structural descriptors of anthracene using topological coindices through CoM-polynomial.
19. T‐depth reduction method for efficient SHA‐256 quantum circuit construction.
20. Quantum Modular Adder over GF(2n − 1) without Saving the Final Carry
21. The Secure IEEE 11073:20601 Protocol and Agent Structure for Protecting PHD
22. Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device
23. Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
24. Quantum Modular Adder over GF (2 n − 1) without Saving the Final Carry.
25. Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet
26. Secure Data Encryption for Cloud-Based Human Care Services
27. Wi-Fi Fingerprint Based Approach to Securing the Connected Vehicle Against Wireless Attack
28. An Implementation and Experiment of Wireless Attack Emulator on Windows Environment
29. The Study on Structure of IEEE 11073:20601 Agent for Protecting PHD
30. Privacy-preserving PKI design based on group signature
31. Design and implementation of handheld wireless LAN analyzer system
32. A Method of Authenticating WLAN APs for Smartphones
33. Short Group Signatures with Controllable Linkability
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.