Search

Your search keyword '"Won, Dongho"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Won, Dongho" Remove constraint Author: "Won, Dongho"
27 results on '"Won, Dongho"'

Search Results

1. Absolute configuration determination of isoflavan-4-ol stereoisomers

2. Absolute configurations of isoflavan-4-ol stereoisomers

3. Lightweight Hash-Based Authentication Protocol for Smart Grids.

4. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.

5. Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.

6. Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.

7. MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^.

8. A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols.

9. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

10. Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving.

11. A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol

12. An improved anonymous authentication scheme for roaming in ubiquitous networks.

13. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

14. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

15. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

16. Can differential privacy practically protect collaborative deep learning inference for IoT?

17. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

18. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

19. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.

20. A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.

21. Towards trustworthy e-voting using paper receipts

22. Time-dependent density functional theory-assisted absolute configuration determination of cis-dihydrodiol metabolite produced from isoflavone by biphenyl dioxygenase

23. Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks

24. Security weakness in a three-party pairing-based protocol for password authenticated key exchange

25. A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems †.

26. A three-factor anonymous user authentication scheme for Internet of Things environments.

27. Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.

Catalog

Books, media, physical & digital resources