Search results for: Howon Kim
Lecture Notes in Computer Science > Computational Intelligence and Security > Security Models and Architecture > 469-475
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Ubiquitous Web Systems and Intelligence Workshop > 1146-1155
Lecture Notes in Computer Science > Computational Intelligence and Security > Applications > 1104-1109
Lecture Notes in Computer Science > High Performance Computing and Communications > Track 10: Reliability, Fault-Tolerance, and Security > 567-572
Lecture Notes in Computer Science > Information Networking. Advances in Data Communications and Wireless Networks > Ad Hoc Sensor Networks > 317-326
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 417-426
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Embedded System for Ubiquitous Computing (ESUC 2006) > 584-593
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006) > 251-259
Lecture Notes in Computer Science > Information Security Applications > Efficient HW Implementation > 207-217
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > TRUST 2006 Workshop > 579-590
Lecture Notes in Computer Science > Personal Wireless Communications > Mobile and Wireless Applications > 494-505
Lecture Notes in Computer Science > E-Commerce and Web Technologies > Security and Trust in E-Commerce > 316-326
Lecture Notes in Computer Science > Progress in WWW Research and Development > Privacy, and Security > 331-341
The Journal of Supercomputing > 2018 > 74 > 8 > 3521-3535
Multimedia Tools and Applications > 2016 > 75 > 22 > 14685- 14706
Journal of Computer Science and Technology > 2016 > 31 > 2 > 284-299
Security and Communication Networks > 8 > 18 > 3546 - 3554