Search results for: Dong Kyue Kim
Lecture Notes in Computer Science > Information Security Applications > Smart Cards/Secure Hardware > 173-186
Lecture Notes in Computer Science > Automata, Languages and Programming > Contributed Papers > 463-472
Lecture Notes in Computer Science > Computational Intelligence and Security > Applications > 1104-1109
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Techniques I > 74-84
Lecture Notes in Computer Science > Combinatorial Pattern Matching > Session 10: Suffix Arrays and Trees > 352-364
Lecture Notes in Computer Science > Image Analysis and Recognition > Image Restoration and Enhancement > 146-155
Lecture Notes in Computer Science > Information Security Applications > Efficient HW Implementation > 207-217
Lecture Notes in Computer Science > Experimental and Efficient Algorithms > Contributed Regular Papers > 315-327
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 427-434
Computers & Security > 2016 > 56 > Complete > 140-150
2015 International SoC Design Conference (ISOCC) > 315 - 316
2015 International SoC Design Conference (ISOCC) > 341 - 342