Search results for: Sung Je Hong
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications/Virus Protection > 45-59
Lecture Notes in Computer Science > Information Security and Cryptology > Computer and Applications Security > 238-252
Lecture Notes in Computer Science > Computational Science and Its Applications — ICCSA 2003 > Reconstruction, Approximation, and Morphing > 508-517
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Symmetric Cryptography > 382-396
Lecture Notes in Computer Science > Agents and Peer-to-Peer Computing > Trust and Reputation > 30-43
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Computational Geometry and Applications (CGA 2006) > 151-160
IEEE Communications Letters > 2012 > 16 > 9 > 1478 - 1481
IEEE Transactions on Vehicular Technology > 2012 > 61 > 6 > 2707 - 2714
IEEE Communications Letters > 2011 > 15 > 4 > 434 - 436
IEEE Transactions on Wireless Communications > 2011 > 10 > 2 > 592 - 601
The Journal of Systems & Software > 2009 > 82 > 7 > 1163-1167
International Journal of Information Security > 2009 > 8 > 4 > 263-273
Computer-Aided Design > 2007 > 39 > 6 > 452-459
Journal of Grid Computing > 2004 > 2 > 1 > 43-55
Journal of Parallel and Distributed Computing > 2003 > 63 > 12 > 1315-1324