Search results for: Jeong Hyun Yi
Multimedia Tools and Applications > 2018 > 77 > 4 > 5027-5042
Wireless Networks > 2018 > 24 > 8 > 2835-2849
IEEE Access > 2017 > 5 > 6361 - 6371
The Journal of Supercomputing > 2018 > 74 > 9 > 4261-4280
Lecture Notes in Computer Science > Stabilization, Safety, and Security of Distributed Systems > Regular Papers > 533-547
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Network Security > 362-379
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2007 > Number Theoretic Techniques > 442-457
Lecture Notes in Computer Science > NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems > Ad Hoc Networks II > 1083-1095
Security and Communication Networks > 9 > 6 > 457 - 467
Multimedia Tools and Applications > 2016 > 75 > 22 > 14833- 14848
The Journal of Supercomputing > 2016 > 72 > 9 > 3629-3645
The Journal of Supercomputing > 2016 > 72 > 1 > 232-246
Wireless Personal Communications > 2013 > 73 > 4 > 1421-1437