Digital Library
Search: "[ keyword: Token ]" (7)
A Token Based Clustering Algorithm Considering Uniform Density Cluster in Wireless Sensor Networks
Hyun Seok Lee , Jeong Seok Heo The KIPS Transactions:PartC,
Vol. 17, No. 3, pp. 291-298,
Jun.
2010
10.3745/KIPSTC.2010.17.3.291
TokenROC: A ROC-Based Evaluation Method for XAI Techniques in Software Vulnerability Token Detection
Jaehong Kim, Sebeom Cheon, Sungmin Han, Sangkyun Lee The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 677-686,
Sep.
2025
https://doi.org/10.3745/TKIPS.2025.14.9.677
Keywords: Software Vulnerability Detection, Vulnerable Token Identification, Explainable Artificial Intelligence
Keywords: Software Vulnerability Detection, Vulnerable Token Identification, Explainable Artificial Intelligence
Token-Bucket-based Performance Control Techniques for Large-Scale Shared Storage Systems
Young Jin Nam , Chan Ik Park The KIPS Transactions:PartA,
Vol. 12, No. 7, pp. 605-612,
Dec.
2005
10.3745/KIPSTA.2005.12.7.605
A Study on Non-Fungible Token Platform for Usability and Privacy Improvement
Kang Myung Joe, Kim Mi Hui KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 11, pp. 403-410,
Nov.
2022
https://doi.org/10.3745/KTCCS.2022.11.11.403
Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement
Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement
Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks
Sang Kil Park , Jin Tae Oh , Ki Young Kim The KIPS Transactions:PartC,
Vol. 11, No. 7, pp. 951-958,
Dec.
2004
10.3745/KIPSTC.2004.11.7.951
IoT Multi-Phase Authentication System Using Token Based Blockchain
Hwan Park, Mi-sun Kim, Jae-hyun Seo KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 6, pp. 139-150,
Jun.
2019
https://doi.org/10.3745/KTCCS.2019.8.6.139
Keywords: IoT, Mutual Authentication, Protocol, Blockchain, Token
Keywords: IoT, Mutual Authentication, Protocol, Blockchain, Token
An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks
Lee Jae Sik , Kim Sung Chun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 4, pp. 156-163,
Apr.
2013
10.3745/KTCCS.2013.2.4.156