![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments
Recently, Aaronson et al. (ar** these states. While their original motivation was from quantum gravity, we ...
-
Article
Open AccessScalable design and algorithm for science DMZ by considering the nature of research traffic
This paper explores the nature of scientific research traffic on the Korea research environment open network. Based on these investigations, we propose a scalable design and algorithm for the science demilitar...
-
Chapter and Conference Paper
DoFNet: Depth of Field Difference Learning for Detecting Image Forgery
Recently, online transactions have had an exponential growth and expanded to various cases, such as opening bank accounts and filing for insurance claims. Despite the effort of many companies requiring their o...
-
Article
Extraction of Product Evaluation Factors with a Convolutional Neural Network and Transfer Learning
Earlier studies have indicated that decision-making by a project development team can be improved throughout the design and development process by understanding the key factors that affect customers evaluation...
-
Article
Variable-categorized clustering algorithm using fuzzy logic for Internet of things local networks
This paper presents a variable-categorized clustering algorithm (VCCA) using fuzzy logic for Internet of Things (IoT) local networks. The VCCA selects the cluster head (CH) that has the highest network capacit...
-
Chapter and Conference Paper
GA-Based Filter Selection for Representation in Convolutional Neural Networks
One of the deep learning models, a convolutional neural network (CNN) has been very successful in a variety of computer vision tasks. Features of a CNN are automatically generated, however, they can be further...
-
Chapter and Conference Paper
Resource Optimized Neural Architecture Search for 3D Medical Image Segmentation
Neural Architecture Search (NAS), a framework which automates the task of designing neural networks, has recently been actively studied in the field of deep learning. However, there are only a few NAS methods ...
-
Chapter and Conference Paper
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
We initiate a systematic study of pseudorandom functions (PRFs) that are computable by simple matrix branching programs; we refer to these objects as “matrix PRFs”. Matrix PRFs are attractive due to their sim...
-
Chapter and Conference Paper
Quantum Random Oracle Model with Auxiliary Input
The random oracle model (ROM) is an idealized model where hash functions are modeled as random functions that are only accessible as oracles. Although the ROM has been used for proving many cryptographic schem...
-
Chapter and Conference Paper
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
We present a new cryptanalytic algorithm on obfuscations based on GGH15 multilinear map. Our algorithm, statistical zeroizing attack, directly distinguishes two distributions from obfuscation while it follows the...
-
Article
Popularity-based covering sets for energy proportionality in shared-nothing clusters
Energy management for large-scale clusters has been the subject of significant research attention in recent years. The principle of energy proportionality states that we can save energy by activating only a subse...
-
Chapter and Conference Paper
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
In this paper, we propose cryptanalyses of all existing indistinguishability obfuscation (iO) candidates based on branching programs (BP) over GGH13 multilinear map for all recommended parameter settings. To achi...
-
Article
A revised cache allocation algorithm for VoD multicast service
The Internet is replacing the traditional telephone network as the ubiquitous network infrastructure. Internet customers are increasing at an exponential rate and will continue to increase in the near future. ...
-
Chapter and Conference Paper
Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e Network
Since the Wibro service realize mobile network on the public, it has been considered that it is not enough to support real time service at vehicular speed. The standard Fast Mobile IPv6 Handover Protocol using...
-
Chapter and Conference Paper
A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration
This paper introduces rule-based reasoning (RBR) Expert System for network fault and security diagnosis and a mechanism for optimization. In this system, we use agent collaboration mechanism which is the proce...
-
Chapter and Conference Paper
A Study on TCP Buffer Management Algorithm for Improvement of Network Performance in Grid Environment
The Grid is the environment that connects high performance computing resource, which are scattered geographically as related network. The Grid, which started in the mid of 1990, has studied and laid across in ...