全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Seungtae Hong , Hyeong-Il Kim , Jae-Woo Chang
来源:[J].World Wide Web(IF 1.196), 2017, Vol.20 (3), pp.467-490Springer
摘要:Recently, researches on key management scheme for user access control in outsourced databases have been actively done. Because outsourced databases require dealing with a lot of users and data resources, an efficient key management scheme for reducing the number of authentication...
作者:Hyeong-Il Kim , Jae-Woo Chang
来源:[J].International Journal of Distributed Sensor Networks(IF 0.727), 2014, Vol.2014Hindawi
摘要:Data aggregation techniques have been widely used in wireless sensor networks (WSNs) to solve the energy constraint problems of sensor nodes. They can conserve the significant amount of energy by reducing data packet transmission costs. However, many data aggregation applications...
作者:Hyeong-Il Kim , Hyeong-Jin Kim , Jae-Woo Chang
来源:[J].Data & Knowledge Engineering(IF 1.519), 2019, Vol.123Elsevier
摘要:Abstract(#br)With the adoption of cloud computing, database outsourcing has emerged as a new platform. Due to the serious privacy concerns associated with cloud computing, databases must be encrypted before being outsourced to the cloud. Therefore, various k-nearest neighbor...
作者:... Edward A. Monaco , Hyeong-Il Kim , Elaine L. Davis
来源:[J].The Journal of Prosthetic Dentistry(IF 1.724), 2013, Vol.110 (5), pp.389-396Elsevier
摘要:Statement of problem(#br)The predictable nature of the hot pressing ceramic technique has several applications, but no study was identified that evaluated its application to the fabrication of custom implant abutments.(#br)Purpose(#br)The purpose of this study was to compare...
作者:Hyeong-Il Kim , Seungtae Hong , Jae-Woo Chang
来源:[J].Data & Knowledge Engineering(IF 1.519), 2016, Vol.104, pp.32-44Elsevier
摘要:Abstract(#br)Research on preserving location data privacy in outsourced databases has been spotlighted with the development of cloud computing. However, the existing spatial transformation schemes are vulnerable to various attack models. The existing cryptographic transformation ...
作者:Hyeong-Il Kim , Jane D. Brewer
来源:[J].The Journal of Prosthetic Dentistry(IF 1.724), 2009, Vol.101 (4), pp.226-230Elsevier
摘要:Statement of problem(#br)The adequacy of the strength of dental zirconia abutments under heavy occlusal load conditions is questionable, with degradation of the mechanical properties of zirconia having been reported. Therefore, some alternatives must be considered.(#br)Purpo...
作者:Hyeong-Il Kim , Jae-Woo Chang
来源:[J].Journal of Computer Science and Technology(IF 0.477), 2013, Vol.28 (4), pp.585-596Springer
摘要:Abstract(#br)Recent development of wireless communication technologies and the popularity of smart phones are making location-based services (LBS) popular. However, requesting queries to LBS servers with users’ exact locations may threat the privacy of users. Therefore, ther...
作者:Hyeong-Il Kim , Elaine L. Davis
来源:[J].Implant Dentistry(IF 1.404), 2014, Vol.23 (1), pp.79-84Wolters Kluwer
摘要:PURPOSE:: This study compares implant primary stability achieved in cancellous bone after placement in piezoelectric prepared sites versus conventionally drilled sites. MATERIALS AND METHODS:: Four bovine ribs were randomly assigned and placed in a water bath at 36.5°C. Five...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×