Digital Library
Search: "[ keyword: 보안 ]" (58)
-
Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
10.7472/jksii.2012.13.2.51
Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments -
Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy -
Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
Keywords: Multicast Security, Group Key Management, Network Security -
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model -
25. Study of Document Distribution System Architecture for Digital Secret Document Leakage PreventionCheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution -
Tae-Jin Park, Jun-Cheol Park, Vol. 9, No. 6, pp. 1-14, Dec. 2008
Keywords: TPM(Trusted Platform Module), Trusted Computing -
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho, Vol. 9, No. 6, pp. 63-72, Dec. 2008
Keywords: Ubiquitous Environment, Heterogeneous Network Security, Secure Network Management, User Authentication -
Chang-Won Jeong, Dong-Ho Kim, Myung-Hee Kim, Su-Chong Joo, Vol. 8, No. 6, pp. 29-42, Dec. 2007
Keywords: dynamic security service, access control model, Distributed Object Group Framework -
Yong-Joon Jun, Gi-Hwan Cho, Won-Kyu Kim, Vol. 7, No. 5, pp. 81-94, Oct. 2006
Keywords: BS7799, ISMS, Control Object -
JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
10.7472/jksii.2025.26.3.135
Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence




