• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: graph ]" (36)
  1. 21. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints
    Unil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
    10.7472/jksii.2014.15.6.125
    Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining
  2. 22. Study on WP-IBE compliant Mobile IPSec
    Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
    10.7472/jksii.2013.14.5.11
    Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption
  3. 23. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    10.7472/jksii.2012.13.2.59
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing
  4. 24. Conformity Assessment and Test Method for Implementation of Web Services Compositions based on Choreography
    Seung-Hak Kuk, Yong-Jin Seo, Hyeon-Soo Kim, Vol. 13, No. 1, pp. 83-98, Feb. 2012
    10.7472/jksii.2012.13.1.83
    Keywords: Service Oriented Architecture, Web Services Composition, Choreography, Software Test
  5. 25. An Implementation of Graphic Offloading Computing using GPU Virtualization based on API Remoting on a Server-based Software Service
  6. 26. Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention
    Cheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
    Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution
  7. 27. An Efficient Incremental Evaluation Technique Using an Extended Dependency Chart
  8. 28. Steganographic Model based on Low bit Encoding for VoIP
    Young-Mi Kim, Vol. 8, No. 5, pp. 141-150, Oct. 2007
    Keywords: Steganography, Information Hiding, Low bit Encoding, Cover Data, Stego Data
  9. 29. An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID
  10. 30. Role Graph Security Management Model based on Lattice
    Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
    Keywords: MAC, Lattice, RBAC, Role Graph, access control