Digital Library
Search: "[ keyword: Security ]" (69)
-
Kim Sang-Kyun, Lee Hong-Joo, Vol. 7, No. 3, pp. 93-106, Jun. 2006
Keywords: Instant messenger, Risk Analysis, Security Management -
Lee Sun-Young, Vol. 7, No. 1, pp. 39-48, Feb. 2006
Keywords: Hash Function, Perfect diffusion, Security, approximated model, chaining pattern, differential characteristic -
Choi Yumi, Lee Hyung-Min, Choo Hyunseung, Vol. 6, No. 3, pp. 107-120, Jun. 2005
Keywords: mobile IP, Handoff, AAA, Security -
Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security -
Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
Keywords: Network Security, Attack Detection, Attack Traffic Modeling -
Ko Hoon, Jang Uijin, Shin Yongtae, Vol. 5, No. 2, pp. 33-40, Apr. 2004
Keywords: Network Security, internet security, encrypt protocol, information security, wireless internet security -
Ko Jeong-Ho, Lee Gang-Soo, Vol. 5, No. 2, pp. 17-32, Apr. 2004
Keywords: Information security system evaluation, CC, Protection profile, Security environment, Assumptions statement -
Kim Byung-Gi, Hong Sang-Sun, Jouhn Young-Keel, Vol. 5, No. 1, pp. 99-0, Feb. 2004
Keywords: Adhoc communication, Ubiquitous, Peer-to-Peer Security, Personal Mutual Authentication -
Do Kyoung-Hwa, Jun Moon-Seog, Vol. 4, No. 5, pp. 21-30, Oct. 2003
Keywords: Steganography, DRM, Information Hiding, Network Security