Lee, Sokjoon
28  Ergebnisse:
Personensuche X
?
1

VulnHunt-GPT: a Smart Contract vulnerabilities detector bas..:

, In: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing,
Boi, Biagio ; Esposito, Christian ; Lee, Sokjoon - p. 1517-1524 , 2024
 
?
2

ARdetector: android ransomware detection framework:

Li, Dan ; Shi, Wenbo ; Lu, Ning..
The Journal of Supercomputing.  80 (2023)  6 - p. 7557-7584 , 2023
 
?
6

$$T{-}depth$$ Reduction Method for Efficient $$SHA{-}256$$ ..:

, In: Information Security and Cryptology – ICISC 2021; Lecture Notes in Computer Science,
Lee, Jongheon ; Lee, Sokjoon ; Lee, You-Seok. - p. 379-402 , 2022
 
?
 
?
9

Lightweight Implementations of NIST P-256 and SM2 ECC on 8-..:

Zhou, Lu ; Su, Chunhua ; Hu, Zhi..
ACM Transactions on Embedded Computing Systems (TECS).  18 (2019)  3 - p. 1-13 , 2019
 
?
10

Lightweight Implementations of NIST P-256 and SM2 ECC on 8-..:

Zhou, Lu ; Su, Chunhua ; Hu, Zhi..
ACM Transactions on Embedded Computing Systems.  18 (2019)  3 - p. 1-13 , 2019
 
?
11

OpenCL Based Implementation of ECDSA Signature Verification..:

, In: Lecture Notes in Electrical Engineering; Advanced Multimedia and Ubiquitous Engineering,
Lee, Sokjoon ; Seo, Hwajeong ; Chunng, Byungho... - p. 711-716 , 2018
 
?
12

Design and Implementation on the Access Control Scheme Agai..:

, In: Lecture Notes in Electrical Engineering; Advanced Multimedia and Ubiquitous Engineering,
Lee, Sokjoon ; Chung, Byungho ; Choi, Joongyong. - p. 705-710 , 2018
 
?
14

Attacks about Channel Bonding on WLAN:

, In: 2014 International Conference on IT Convergence and Security (ICITCS),
 
1-15