Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jung Ha Paik"'
Autor:
Jung Ha Paik, Dong Hoon Lee
Publikováno v:
Computer Communications. 70:28-39
Web real-time communication (WebRTC) provides browser-to-browser communications without installing any plug-in. In WebRTC, peers have to prepare their communication session through a signaling protocol which coordinates peers and exchanges Session De
Publikováno v:
Journal of Korean Society for Internet Information. 13:83-93
HTML5 has developed not to have browser dependancy considering interoperability as same as maintaining compatability with lower versions of HTML. HTML5, the newest web standardization is on going of being structured. Along with the smart phone boom,
Publikováno v:
Security and Communication Networks. 9:248-261
The availability of the Web service has been exposed to several threats such as distributed denial-of-service attack, which is not an unfamiliar terminology anymore. Sustaining availability against various attacks becomes the critical issue for high-
Publikováno v:
MUE
Recently, the block cipher is one of the most common security primitive for the data-confidentiality. In this paper, we present an efficient implementation method of block cipher in the Android platform by using the Native Development Kit(NDK). We al
Publikováno v:
MUE
As Graphic Processing Units (GPUs) are increasingly being used for general purpose computing, researches on applying GPUs for processing a number of crypto operations have been conducted. In this paper, we present an efficient implementation of Korea
Publikováno v:
EUC (2)
Position based routing protocols have been a great deal of attention in vehicular ad hoc networks. The routing protocols are very efficient in high mobility ad hoc network since the path to a destination can be proactively determined by location info
Publikováno v:
2008 International Conference on Information Security and Assurance (isa 2008).
According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both pr
Publikováno v:
2011 5th FTRA International Conference on Multimedia & Ubiquitous Engineering (MUE); 2011, p167-172, 6p
Publikováno v:
2008 International Conference on Information Security & Assurance (ISA 2008); 2008, p67-72, 6p