Search results for: Joong Lee
Journal of Separation Science > 39 > 8 > 1433 - 1441
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 283-291
Lecture Notes in Computer Science > Security Protocols > 131-138
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Internet Communication Security Workshop > 802-811
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Broadcast and Multicast > 359-373
Lecture Notes in Computer Science > Database Systems for Advanced Applications > Social Network > 38-52
Lecture Notes in Computer Science > Information Security Applications > Digital Rights Management > 264-277
Lecture Notes in Computer Science > Information Security Applications > Applied Cryptography > 474-488
Lecture Notes in Computer Science > Knowledge-Based Intelligent Information and Engineering Systems > Artificial Intelligence Applications in Power Electronics > 893-899
Lecture Notes in Computer Science > Information Security and Privacy > Broadcast Encryption and Traitor Tracing > 36-49