Search

Your search keyword '"Taekyoung Kwon"' showing total 829 results

Search Constraints

Start Over You searched for: Author "Taekyoung Kwon" Remove constraint Author: "Taekyoung Kwon"
829 results on '"Taekyoung Kwon"'

Search Results

1. On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks

2. Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge

3. Membership Inference Attacks With Token-Level Deduplication on Korean Language Models

4. Toward Fast and Scalable Firmware Fuzzing With Dual-Level Peripheral Modeling

5. Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph

6. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things

7. Special Issue on Cyber Security and AI

8. Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

9. Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks

10. Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things

11. Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things

12. A Password Meter without Password Exposure

13. Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks

15. A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes

17. GD: Location-Aware Key Management for General Deployment of Wireless Sensor Networks

18. Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game.

22. Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks

Catalog

Books, media, physical & digital resources