نتایج جستجو برای: yung

تعداد نتایج: 546  

2010
Ji Hyun Kwon Yu Jung Kim Keun-Wook Lee Do-Youn Oh Yeon Park Jee Hyun Kim Eui Kyu Chie Sung-Won Kim Tae-You Kim Dong-Young Noh Yung-Jue Bang Sung Whan Ha

Ji Hyun Kwon ([email protected]) Yu Jung Kim ([email protected]) Keun-Wook Lee ([email protected]) Do-Youn Oh ([email protected]) So Yeon Park ([email protected]) Jee Hyun Kim ([email protected]) Eui Kyu Chie ([email protected]) Sung-Won Kim ([email protected]) Seock-Ah Im ([email protected]) In-Ah Kim ([email protected]) Tae-You Kim ([email protected]) In Ae Park ([email protected]) Dong...

2013
Ki Heon Nam Yoon Jin Cha Young Eun Kwon Yung Ly Kim Kyoung Sook Park Seong Yeong An Beom Jin Lim Hyeon Joo Jeong Hyung Jung Oh Tae-Hyun Yoo Shin-Wook Kang Kyu Hun Choi Seung Hyeok Han

THE EWHA MEDICAL JOURNAL Minimal Change Disease in Systemic Lupus: Another Renal Manifestation of Lupus? Ki Heon Nam, Yoon Jin Cha, Young Eun Kwon, Yung Ly Kim, Kyoung Sook Park, Seong Yeong An, Beom Jin Lim, Hyeon Joo Jeong, Hyung Jung Oh, Tae-Hyun Yoo, Shin-Wook Kang, Kyu Hun Choi, Seung Hyeok Han Departments of Internal Medicine and Pathology, Yonsei University College of Medicine, Brain Kor...

2012
Yuan-An Liu Yuan-Chiang Chung Shien-Tung Pan Yung-Chi Hou Shih-Jung Peng Pankaj J. Pasricha Shiue-Cheng Tang

Yuan-An Liu,* Yuan-Chiang Chung,* Shien-Tung Pan, Yung-Chi Hou, Shih-Jung Peng, Pankaj J. Pasricha,* and Shiue-Cheng Tang* Department of Chemical Engineering, National Tsing Hua University; Division of Colorectal Surgery, National Taiwan University Hospital–Hsinchu Branch; Department of Pathology, National Taiwan University Hospital–Hsinchu Branch; and Institute of Biotechnology, National Tsing...

2017
Ying-Fa Chen Yung-Yee Chang Pei-Lung Chen Chin-Hsien Lin Taku Hatano

Title: Identification of VPS35 p.D620N mutation-related Parkinson's disease in a Taiwanese family with successful bilateral subthalamic nucleus deep brain stimulation: a case report and literature review Authors: Ying-Fa Chen ([email protected]) Yung-Yee Chang ([email protected]) Min-Yu Lan ([email protected]) Pei-Lung Chen ([email protected]) Chin-Hsien Lin ([email protected]) Versio...

2005
Yvo Desmedt Yongge Wang Reihaneh Safavi-Naini Huaxiong Wang

Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the general networks modeled by hypergraphs. Radio networks have received special attention in recent years. For example, the Bluetooth and IEEE 802.11 networks are all based on radio network technologies. In this paper, we use di...

2016
Won-Gon Kim

A book of brief records of open heart surgery underwent between 1959 and 1982 at Seoul National University Hospital was recently found. The book was hand-written by the late professor and cardiac surgeon Yung Kyoon Lee (1921-1994). This book contains valuable information about cardiac patients and surgery at the early stages of the establishment of open heart surgery in Korea, and at Seoul Nati...

2013
Dalia Khader Qiang Tang Peter Y. A. Ryan

Prêt à Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Prêt à Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this paper we propose a variant of Prêt à Voter and prove receipt freeness of this scheme using computational methods. Our proof shows that if there exists ...

2013
Georgios Tsoukalas Kostas Papadimitriou Stephen N. Goggin

Prêt à Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Prêt à Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this paper we propose a variant of Prêt à Voter and prove receipt freeness of this scheme using computational methods. Our proof shows that if there exists ...

2006
Yvo Desmedt Yongge Wang Mike Burmester

Dolev-Dwork-Waarts-Yung linked research on reliable point-to-point networks with privacy and authenticity. In their threat model the adversary can only take over a number of nodes bounded by a threshold k. Hirt-Maurer introduced the concept of an adversary structure (i.e. the complement of an access structure). KumarGoundan-Srinathan-Rangan and Desmedt-Wang-Burmester generalized Dolev-DworkWaar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید