-
1Academic Journal
المؤلفون: Taejin Lee, Hesun Cho, Haeryong Park, Jin Kwak
المصدر: International Journal of Distributed Sensor Networks, Vol 11 (2015)
مصطلحات موضوعية: Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1550-1477
-
2Academic Journal
المؤلفون: Haeryong PARK, Kilsoo CHUN, Seungho AHN
المصدر: IEICE Transactions on Communications. 2008, E91.B(3):900
-
3Academic Journal
المؤلفون: Donghoon CHANG, Haeryong PARK, Jaechul SUNG, Jesang LEE, Jongin LIM, Kilsoo CHUN, Mridul NANDI, Seokhie HONG
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2008, E91.A(9):2607
-
4Academic Journal
-
5Academic Journal
-
6Academic Journal
المؤلفون: Zhaoxin Liu, Ok-young Shin, Haeryong Park
المصدر: Wireless Communications and Mobile Computing, Vol 2022 (2022)
مصطلحات موضوعية: Technology, Telecommunication, TK5101-6720
Relation: http://dx.doi.org/10.1155/2022/5358440; https://doaj.org/toc/1530-8677; https://doaj.org/article/dcc321b540694d93b69319d01019c0ec
-
7Academic Journal
المؤلفون: Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, Howon Kim
المصدر: Security and Communication Networks, Vol 2018 (2018)
مصطلحات موضوعية: Technology (General), T1-995, Science (General), Q1-390
Relation: http://dx.doi.org/10.1155/2018/7012056; https://doaj.org/toc/1939-0114; https://doaj.org/toc/1939-0122; https://doaj.org/article/65a8dc3c10e24f34a6f26f5cd6e5bd6d
-
8Academic Journal
المؤلفون: Soon-Tai Park, Haeryong Park, Myoung-sun Noh, Yoo-Jae Won
مصطلحات موضوعية: Wireless LAN Security, Wi-Fi Security, Wireless Access Point, Product Life-Cycle
Relation: https://zenodo.org/communities/waset; https://doi.org/10.5281/zenodo.1075131; https://doi.org/10.5281/zenodo.1075132; oai:zenodo.org:1075132
-
9
المؤلفون: Eul Gyu Im, Haeryong Park, MeongJae Seong, Bomin Choi
المصدر: Journal of Security Engineering. 11:551-566
مصطلحات موضوعية: Flow (mathematics), business.industry, Computer science, Android malware, Network behavior, business, Computer network, Sequence (medicine)
-
10
المؤلفون: Seongan Lim, Kitae Kim, Haeryong Park, Ikkwon Yie
المصدر: Informatica. 22:189-201
مصطلحات موضوعية: Scheme (programming language), Divide and conquer algorithms, business.industry, Computer science, Applied Mathematics, Cryptography, Type (model theory), computer.software_genre, Signature (logic), Field (computer science), Set (abstract data type), Identification (information), Data mining, business, computer, Information Systems, computer.programming_language
-
11
المؤلفون: Seongan Lim, Kitae Kim, Haeryong Park, Junghwan Song, Ikkwon Yie
المصدر: Computer Standards & Interfaces. 31:856-862
مصطلحات موضوعية: Theoretical computer science, Merkle signature scheme, Computer science, business.industry, ElGamal signature scheme, Cryptography, Group signature, Computer security model, Computer security, computer.software_genre, Ring signature, Hardware and Architecture, Blind signature, business, Law, computer, Software, Schnorr signature
-
12
المؤلفون: Seongan Lim, Haeryong Park, Ikkwon Yie
المصدر: Computer Standards & Interfaces. 31:480-483
مصطلحات موضوعية: Key generation, Delegate, business.industry, Computer science, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Key distribution, Cryptography, Computer security, computer.software_genre, Public-key cryptography, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Hardware and Architecture, ComputingMilieux_COMPUTERSANDSOCIETY, Cryptosystem, business, Proxy (statistics), Law, computer, Software, Key escrow
-
13
المؤلفون: Seokung Yoon, Hyeong Seon Yoo, Haeryong Park
المصدر: Computer Science and its Applications ISBN: 9783662454015
مصطلحات موضوعية: business.industry, Cellular network, Internet of Things, business, Computer security, computer.software_genre, computer
-
14
المؤلفون: Hesun Cho, Jin Kwak, Haeryong Park, Taejin Lee
المصدر: INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
International Journal of Distributed Sensor Networks, Vol 11 (2015)مصطلحات موضوعية: Article Subject, Computer Networks and Communications, business.industry, Computer science, Node (networking), Zombie, General Engineering, Botnet, Computer security, computer.software_genre, lcsh:QA75.5-76.95, Srizbi botnet, Sensor node, Cyber-attack, Malware, Open mail relay, lcsh:Electronic computers. Computer science, business, computer, Computer network
وصف الملف: text/xhtml
-
15
المؤلفون: Woong Go, Haeryong Park, Hyunwoo Lim, Seokcheol Lee, Taeshik Shon
المصدر: 2015 International Conference on Platform Technology and Service.
مصطلحات موضوعية: Cloud computing security, Computer science, business.industry, Computer security model, Computer security, computer.software_genre, Security information and event management, Logical security, Smart grid, Security service, Network Access Control, Network security policy, business, computer, Computer network
-
16Conference
المؤلفون: Haeryong Park, Haksoo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh
المصدر: 12th International Conference on Parallel and Distributed Systems - (ICPADS'06) ; volume 2139, page 6 pp.
-
17Conference
المؤلفون: Haeryong Park, Kilsoo Chun, Seungho Ahn
المصدر: 11th International Conference on Parallel and Distributed Systems (ICPADS'05) ; volume 2, page 260-264
-
18
المؤلفون: Haeryong Park, Tongwook Hwang, Youngsang Shin, Kyung-Ho Son
المصدر: Advances in Intelligent Systems Research.
مصطلحات موضوعية: Engineering, Software_OPERATINGSYSTEMS, Cloud computing security, business.industry, Rootkit, Usability, Hypervisor, Cloud computing, computer.software_genre, Computer security, Virtual machine, Operating system, Key (cryptography), Malware, business, computer
-
19
المؤلفون: Gang Shin Lee, Wan S. Yi, Haeryong Park
المصدر: 2010 Fifth International Conference on Internet and Web Applications and Services.
مصطلحات موضوعية: Computer science, business.industry, Key (cryptography), Key distribution, Session key, Static key, Cryptography, Key encapsulation, Encryption, business, Key management, Computer network
-
20
المؤلفون: Seokhie Hong, Haeryong Park, Jesang Lee, Jaechul Sung
المصدر: Advances in Information Security and Assurance ISBN: 9783642026164
ISAمصطلحات موضوعية: Collision resistance, Computer science, SHA-2, Hash buster, Hash function, Cryptographic hash function, Hash chain, MDC-2, Arithmetic, Double hashing