Search

Your search keyword '"SangJin Kim"' showing total 29 results

Search Constraints

Start Over You searched for: Author "SangJin Kim" Remove constraint Author: "SangJin Kim" Topic computer Remove constraint Topic: computer
29 results on '"SangJin Kim"'

Search Results

1. Prediction of Decline in Global Cognitive Function Using Machine Learning with Feature Ranking of Gait and Physical Fitness Outcomes in Older Adults

2. Two-Stage Classification with SIS Using a New Filter Ranking Method in High Throughput Data

3. A New Privacy Aware Payment Scheme for Wireless Charging of Electric Vehicles

4. Prioritizing hypothesis tests for high throughput data

5. Outsourced Storage Auditing Scheme using Coefficient Matrix

6. A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme

7. A Security Hole in Comparable Encryption

8. Speaker Adaptation of Various Components in Deep Neural Network based Speech Synthesis

9. A designated query protocol for serverless mobile RFID systems with reader and tag privacy

10. The Scheme for Delegation of Temporary Right to Watching Pay-TV in N-Screen Service

11. Efficient RFID Search Protocols Using Counters

12. Multiple feed-forward deep neural networks for statistical parametric speech synthesis

13. [Untitled]

14. Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds

15. A DNN-based text-to-speech synthesis system using speaker, gender, and age codes

16. AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET

17. Conditional privacy preserving security protocol for NFC applications

18. ID-based key management scheme using threshold decryption for OPMD environment

19. Key management scheme using secret sharing for multi-device based DRM

20. Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice

21. A Simple Privacy Preserving Route Tracing Mechanism for VANET

22. Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET

23. A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection

24. A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols

25. Welcoming Message from the General Chair and Organizer of ICCIT 2007 Committee

26. A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy

27. Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment

28. A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels

29. Seodang: a desktop video conferencing system for collaborative learning

Catalog

Books, media, physical & digital resources