Digital Library
Search: "[ keyword: Security ]" (69)
-
Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack -
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho, Vol. 9, No. 6, pp. 63-72, Dec. 2008
Keywords: Ubiquitous Environment, Heterogeneous Network Security, Secure Network Management, User Authentication -
Jung-Su Kim, Se-Yul Lee, Jin-Sub Park, Bong-Hwan Lee, Vol. 9, No. 4, pp. 143-156, Aug. 2008
Keywords: Distributed Computing, Grid, PACS, Security, Storage -
Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
Keywords: Access Controls, authentication, internet security -
Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication -
Seng-Phil Hong, Hyun-Me Jang, Vol. 9, No. 2, pp. 51-60, Apr. 2008
Keywords: Privacy, Security, Policy, access control, Security Architecture -
Chang-Won Jeong, Dong-Ho Kim, Myung-Hee Kim, Su-Chong Joo, Vol. 8, No. 6, pp. 29-42, Dec. 2007
Keywords: dynamic security service, access control model, Distributed Object Group Framework -
Min-Gyu Kim, Si-Yong Park, Bong-Hwan Lee, Vol. 8, No. 3, pp. 85-98, Jun. 2007
Keywords: Distributed Computing, Grid Security, Mobile Grid, e-Healthcare -
Seng-Phil Hong, Jae-Hyoun Kim, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business -
Lee Sang-Gon, Lee Hoon-Jae, Vol. 7, No. 3, pp. 133-142, Jun. 2006
Keywords: key agreement, ID based, Security, Unknown key-share attack, inpersonation attack