نتایج جستجو برای: yung
تعداد نتایج: 546 فیلتر نتایج به سال:
Ji Hyun Kwon ([email protected]) Yu Jung Kim ([email protected]) Keun-Wook Lee ([email protected]) Do-Youn Oh ([email protected]) So Yeon Park ([email protected]) Jee Hyun Kim ([email protected]) Eui Kyu Chie ([email protected]) Sung-Won Kim ([email protected]) Seock-Ah Im ([email protected]) In-Ah Kim ([email protected]) Tae-You Kim ([email protected]) In Ae Park ([email protected]) Dong...
THE EWHA MEDICAL JOURNAL Minimal Change Disease in Systemic Lupus: Another Renal Manifestation of Lupus? Ki Heon Nam, Yoon Jin Cha, Young Eun Kwon, Yung Ly Kim, Kyoung Sook Park, Seong Yeong An, Beom Jin Lim, Hyeon Joo Jeong, Hyung Jung Oh, Tae-Hyun Yoo, Shin-Wook Kang, Kyu Hun Choi, Seung Hyeok Han Departments of Internal Medicine and Pathology, Yonsei University College of Medicine, Brain Kor...
Yuan-An Liu,* Yuan-Chiang Chung,* Shien-Tung Pan, Yung-Chi Hou, Shih-Jung Peng, Pankaj J. Pasricha,* and Shiue-Cheng Tang* Department of Chemical Engineering, National Tsing Hua University; Division of Colorectal Surgery, National Taiwan University Hospital–Hsinchu Branch; Department of Pathology, National Taiwan University Hospital–Hsinchu Branch; and Institute of Biotechnology, National Tsing...
Title: Identification of VPS35 p.D620N mutation-related Parkinson's disease in a Taiwanese family with successful bilateral subthalamic nucleus deep brain stimulation: a case report and literature review Authors: Ying-Fa Chen ([email protected]) Yung-Yee Chang ([email protected]) Min-Yu Lan ([email protected]) Pei-Lung Chen ([email protected]) Chin-Hsien Lin ([email protected]) Versio...
Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the general networks modeled by hypergraphs. Radio networks have received special attention in recent years. For example, the Bluetooth and IEEE 802.11 networks are all based on radio network technologies. In this paper, we use di...
A book of brief records of open heart surgery underwent between 1959 and 1982 at Seoul National University Hospital was recently found. The book was hand-written by the late professor and cardiac surgeon Yung Kyoon Lee (1921-1994). This book contains valuable information about cardiac patients and surgery at the early stages of the establishment of open heart surgery in Korea, and at Seoul Nati...
Prêt à Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Prêt à Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this paper we propose a variant of Prêt à Voter and prove receipt freeness of this scheme using computational methods. Our proof shows that if there exists ...
Prêt à Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Prêt à Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this paper we propose a variant of Prêt à Voter and prove receipt freeness of this scheme using computational methods. Our proof shows that if there exists ...
Dolev-Dwork-Waarts-Yung linked research on reliable point-to-point networks with privacy and authenticity. In their threat model the adversary can only take over a number of nodes bounded by a threshold k. Hirt-Maurer introduced the concept of an adversary structure (i.e. the complement of an access structure). KumarGoundan-Srinathan-Rangan and Desmedt-Wang-Burmester generalized Dolev-DworkWaar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید