Proc. 17th International Workshop on Information Security Applications (WISA 2016), 2016-08-26
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10144 LNCS, page. 29 - 41, 2017-03
The 2nd International Conference on Ubiquitous Information Technologies & Applications (ICUT 2008)
JOURNAL OF SYSTEMS ARCHITECTURE, vol. 48, no. 8-10, page. 237 - 254, 2003-03
World Conference on Information Security Applications, 2018-08-23
IEICE Transactions on Communications, vol. E95-B, no. 7, page. 2459 - 2462, 2012-07
JOURNAL OF SYSTEMS AND SOFTWARE, vol. 82, no. 7, page. 1163 - 1167, 2009-07
Proc. 6th International Symposium on Embedded Technology (ISET 2011), 2011-05-20
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, vol. E93D, no. 12, page. 3194 - 3201, 2010-12
Proc. 14th International Symposium on Recent Advances in Intrusion Detection(RAID 2011), 2011-09-20
International Conference on Compiler Construction, 2019-02-16
The 2nd Joint Workshop on Information Security (JWIS 2007), 2007-08-07
IEEE COMPUTER ARCHITECTURE LETTERS, vol. 17, no. 1, page. 80 - 83, 2018-01
IEEE/ACM International Symposium on Microarchitecture, page. 455 - 468, 2018-10-22
IEEE Symposium on Security and Privacy (S&P), 2014-05-19
Proc. 35th IEEE Symposium on Security and Privacy, 2014-05-19
한국정보과학회 2004년도 추계 학술발표, page. 46 - 48, 2004-10-22
International Conference on Parallel and Distributed Systems, page. 414 - 421, 1997-12-01
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, vol. 58, no. 1, page. 26 - 43, 1999-07
PARALLEL COMPUTING, vol. 29, no. 1, page. 135 - 159, 2003-01