356 results on '"Hwang, Seong Oun"'
Search Results
2. A probabilistic model of quantum states for classical data security
3. Energy Efficient Cross Layer Time Synchronization in Cognitive Radio Networks
4. Implementation of Symbol Timing Recovery for Estimation of Clock Skew
5. Analysis of Federated Learning Paradigm in Medical Domain: Taking COVID-19 as an Application Use Case
6. Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era
7. cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications
8. A Data-Centric AI Paradigm for Socio-Industrial and Global Challenges.
9. An Efficient Searchable Encryption Scheme in the Multi-user Environment
10. Speed Record of AES-CTR and AES-ECB Bit-Sliced Implementation on GPUs
11. A Data-driven Feature Extraction Method Based on Data Supplement for Human Activity Recognition
12. A Multifaceted Survey on Federated Learning: Fundamentals, Paradigm Shifts, Practical Issues, Recent Developments, Partnerships, Trade-offs, Trustworthiness, and Ways Forward
13. Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines
14. Fall Detection of the Elderly Using Denoising LSTM-based Convolutional Variant Autoencoder
15. High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka
16. Privacy Preserving Based on Seamless Authentication with Provable Key Verification using mIoMT for B5G-enabled Healthcare Systems
17. Efficient TMVP-Based Polynomial Convolution on GPU for Post-Quantum Cryptography Targeting IoT Applications
18. Efficient Anonymous Multi-group Broadcast Encryption
19. High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications
20. A Lightweight Public Key Encryption Scheme with Equality Test for Distributed Healthcare System
21. Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence
22. Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
23. Structure of Security Proof
24. Modern Cryptography with Proof Techniques and Applications
25. Digital Signature
26. Tight Reduction
27. Introduction to Lattice
28. Code-Based Cryptography
29. Identity-Based Encryption (4)
30. Lattice-Based Cryptography
31. Private-Key Encryption (3)
32. Attribute-Based Encryption
33. Hash Function
34. Identity-Based Encryption (3)
35. Predicate Encryption and Functional Encryption
36. Private-Key Encryption (2)
37. Secret Sharing
38. Introduction to Cryptography
39. Selected Algorithms
40. Identity-Based Encryption (2)
41. Message Authentication Code
42. Introduction to Linear Codes
43. Introduction to Number Theory
44. Broadcast Encryption
45. Private-Key Encryption (1)
46. Transformation Technique
47. Public-Key Encryption
48. Identity-Based Encryption (1)
49. Hierarchical Identity-Based Encryption
50. A neural network approach to remove rain using reconstruction and feature losses
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.