IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, vol. E91D, no. 5, page. 1390 - 1397, 2008-05
Proc. 22nd ACM Conference on Computer and Communications Security (CCS 2015), 2015-10-12
IEEE TRANSACTIONS ON COMPUTERS, vol. 42, no. 9, page. 1078 - 1088, 1993-09
Computer Vision and Image Understanding, vol. 223, 2022-10
NEW GENERATION COMPUTING, vol. 17, no. 3, page. 229 - 254, 1999-01
IEEE JOURNAL OF SOLID-STATE CIRCUITS, vol. 33, no. 8, page. 1266 - 1272, 1998-08
IEEE/IFIP International Conference on Dependable Systems and Networks, 2018-06-25
37th Annual Computer Security Applications Conference, ACSAC 2021, page. 586 - 595, 2021-12-08
한국컴퓨터종합학술대회, 2017-06-20
20th USENIX Security Symposium, 2011-08-11
Applied Cryptography and Network Security, 2004-06-01
Lecture Notes in Computer Science, vol. 8909, page. 17 - 26, 2015-01
Journal of Computing Science and Engineering, vol. 7, no. 3, page. 177 - 186, 2013-09
IEEE Communications Letters, vol. 16, no. 9, page. 1478 - 1481, 2012-09
Proc. of the 4th International Conference on Network of the Future (NoF), 2013-10-23
Journal of Systems and Software, vol. 85, no. 5, page. 1058 - 1066, 2012-05
Intl. Conf. on Parallel Processing (ICPP), 1995-08-01
LECTURE NOTES IN COMPUTER SCIENCE, vol. 4096, page. 308 - 317, 2006-01