• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: Network Security" (9)
  1. 1. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    10.7472/jksii.2012.13.2.59
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing
  2. 2. The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution
    Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
    Keywords: Multicast Security, Group Key Management, Network Security
  3. 3. Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention
    Cheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
    Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution
  4. 4. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  5. 5. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  6. 6. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security
  7. 7. Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links
    Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
    Keywords: Network Security, Attack Detection, Attack Traffic Modeling
  8. 8. A Proposal for Transmission Method of Safety CRL to Distributed OCSP Group
  9. 9. The Design and Analysis of Secure DRM Systems using Steganography
    Do Kyoung-Hwa, Jun Moon-Seog, Vol. 4, No. 5, pp. 21-30, Oct. 2003
    Keywords: Steganography, DRM, Information Hiding, Network Security