Search

Your search keyword '"Taekyoung Kwon"' showing total 167 results

Search Constraints

Start Over You searched for: Author "Taekyoung Kwon" Remove constraint Author: "Taekyoung Kwon" Language english Remove constraint Language: english
167 results on '"Taekyoung Kwon"'

Search Results

1. On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks

2. Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge

3. Membership Inference Attacks With Token-Level Deduplication on Korean Language Models

4. Toward Fast and Scalable Firmware Fuzzing With Dual-Level Peripheral Modeling

5. Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph

6. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things

7. Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

8. Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks

9. Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things

10. Special Issue on Cyber Security and AI

11. Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things

12. A Password Meter without Password Exposure

13. Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks

14. A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes

15. GD: Location-Aware Key Management for General Deployment of Wireless Sensor Networks

16. Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game.

17. Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks

18. An SGX-Based Key Management Framework for Data Centric Networking

19. A Password Meter without Password Exposure

21. Group connectivity model for industrial wireless sensor networks

22. A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email

23. Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks

24. AMUSE: Empowering Users for Cost-Aware Offloading with Throughput-Delay Tradeoffs

25. Information Security and Cryptology -- ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

26. Analysis of Context Dependence in Social Interaction Networks of aMassively Multiplayer Online Role-Playing Game

27. A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services.

28. AMUSE: Empowering Users for Cost-Aware Offloading with Throughput-Delay Tradeoffs.

45. Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate.

46. Knowledge-Based User Authentication Associated with Biometrics.

Catalog

Books, media, physical & digital resources