Digital Library[ Search Result ]
Search : "[ keyword: graph ]" (96)
Mutual Quantum Entity Authentication without a Third Party
Min-Sung Kang Ji-Woong Choi Yong-Su Kim Il-Young Kim Sung Moon
Sang-Wook Han
Vol. 45, No. 5, pp. 933-940, May 2020
10.7840/kics.2020.45.5.933
Sang-Wook Han
Vol. 45, No. 5, pp. 933-940, May 2020
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Bio-Mimetic Underwater Covert Communication Technique Using Modified Least Significant Bit
Yongwuk Lee Sangkug Lee Duk Kyung Kim
Vol. 45, No. 3, pp. 508-512, Mar. 2020
10.7840/kics.2020.45.3.508
Vol. 45, No. 3, pp. 508-512, Mar. 2020
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Graph Theory Based Resource Allocation Algorithm for Military Communication Systems: From a Full-Duplex Perspective
Hong-Bae Jeon Bonhong Koo Chan-Byoung Chae Sung-Ho Park Jaedon Park
Vol. 44, No. 7, pp. 1280-1285, Jul. 2019
10.7840/kics.2019.44.7.1280
Vol. 44, No. 7, pp. 1280-1285, Jul. 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Survey on Post-Quantum Cryptography Hardware Implementation Trends and Analysis
Chan-hui Park Hae-young Kim Jang-hyun Ji Ho-won Kim
Vol. 44, No. 7, pp. 1239-1247, Jul. 2019
10.7840/kics.2019.44.7.1239
Vol. 44, No. 7, pp. 1239-1247, Jul. 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Routing Graph Construction Scheme to Prevent Path Failure Due to Mobile Devices in Industrial Wireless Sensor Networks
Sangdae Kim Kwansoo Jung Hyunchong Cho Cheonyong Kim Taehun Yang
Sang-Ha Kim
Vol. 44, No. 3, pp. 528-539, Mar. 2019
10.7840/kics.2019.44.3.528
Sang-Ha Kim
Vol. 44, No. 3, pp. 528-539, Mar. 2019
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Design and Analysis of 2D Acoustic Luneburg Lens
Sang-Hoon Kim Jung-Woo Kim Gunn Hwang
Vol. 43, No. 12, pp. 2168-2174, Dec. 2018
10.7840/kics.2018.43.12.2168
Vol. 43, No. 12, pp. 2168-2174, Dec. 2018
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)