Search results for: Taekyoung Kwon
IEEE Systems Journal > 2017 > 11 > 2 > 494 - 502
Lecture Notes in Computer Science > Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 > Security II > 291-300
Lecture Notes in Computer Science > Fuzzy Logic and Applications > Miscellaneous Applications > 427-436
IEEE Transactions on Mobile Computing > 2016 > 15 > 5 > 1062 - 1076
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Authentication Authorization Accounting (AAA) Workshop > 577-583
Lecture Notes in Computer Science > Artificial Intelligence and Simulation > Computer and Network Security I > 90-99
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Efficient Implementations > 335-351
Lecture Notes in Computer Science > Information Security > Intrusion Detection and Tamper Resistance > 17-31
Lecture Notes in Computer Science > Information Security Applications > Public Key Cryptography / Key Management > 442-457
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Ad Hoc and Sensor Network Security > 390-404
Lecture Notes in Computer Science > Universal Acess in Human Computer Interaction. Coping with Diversity > Part II: Universal Access Methods, Techniques and Tools > 463-472
Lecture Notes in Computer Science > Universal Access in Human-Computer Interaction. Ambient Interaction > Part I: Intelligent Ambients > 113-121
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 996-1005