Ajou University repository

  • Results/Page
  • Sort by
  • In order
  • Authors/record

Showing results 1 to 10 of 871 (Search time: 0.0 seconds).

Smart card-based secure authentication protocol in multi-server IoT environmentoa mark
  • 2020-06-01
  • Multimedia Tools and Applications, Vol.79, pp.15793-15811
  • Springer
CRBF: Cross-Referencing Bloom-Filter-Based Data Integrity Verification Framework for Object-Based Big Data Transfer Systemsoa mark
  • 2023-07-01
  • Applied Sciences (Switzerland), Vol.13
  • Multidisciplinary Digital Publishing Institute (MDPI)
Towards a practical usage for the Sleuth Kit supporting file system add-ons
  • 2024-09-01
  • Forensic Science International: Digital Investigation, Vol.50
  • Elsevier Ltd
Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystemoa mark
  • Shin, Yeonghun;
  • Kim, Hyungchan;
  • Kim, Sungbum;
  • Yoo, Dongkyun;
  • Jo, Wooyeon;
  • Shon, Taeshik
  • 2020-07-01
  • Forensic Science International: Digital Investigation, Vol.33
  • Elsevier Ltd
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
  • Chaudhry, Shehzad Ashraf;
  • Naqvi, Husnain;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik;
  • Sher, Muhammad
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3504-3520
  • Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
  • Chaudhry, Shehzad Ashraf;
  • Kim, I. Luk;
  • Rho, Seungmin;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik
  • 2019-01-16
  • Cluster Computing, Vol.22, pp.1595-1609
  • Springer New York LLC
THE IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY TOOLS (ICT) IN THE FLOW OF INFORAMATION AND COMMUNICATION DEVELOPMENT
  • EKWEMBWE, NLENDE CLARISSE
  • 2017-08
  • Graduate School of International Studies Ajou University
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
  • 2020-06-01
  • Multimedia Tools and Applications, Vol.79, pp.16077-16091
  • Springer
1 2 3 4 88