Digital Library
Search: "[ keyword: ECU ]" (225)
Context-based Dynamic Access Control Model for u-healthcare and its Application
Chang Won Jeong , Dong Ho Kim , Su Chong Joo The KIPS Transactions:PartC,
Vol. 15, No. 6, pp. 493-506,
Dec.
2008
10.3745/KIPSTC.2008.15.6.493
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
RBAC-based Trust Negotiation Model for Grid Security
Hyun Sug Cho , Bong Hwan Lee The KIPS Transactions:PartC,
Vol. 15, No. 6, pp. 455-468,
Dec.
2008
10.3745/KIPSTC.2008.15.6.455
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
An OTP(One Time Password) Key Generation Method and Simulation using Homomorphic Graph by the Fingerprint Features
Byung Rae Cha The KIPS Transactions:PartC,
Vol. 15, No. 6, pp. 447-454,
Dec.
2008
10.3745/KIPSTC.2008.15.6.447
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
CipherSuite Setting Problem of SSL Protocol and It`s Solutions
Yun Young Lee , Soon Haeng Hur , Sang Joo Park , Dong Hwi Shin , Dong Ho Won , Seung Joo Kim The KIPS Transactions:PartC,
Vol. 15, No. 5, pp. 359-366,
Oct.
2008
10.3745/KIPSTC.2008.15.5.359
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study on User Authentication for Roaming in Mobile Device
Seo Il Kang , Choon Sik Park , Im Yeong Lee The KIPS Transactions:PartC,
Vol. 15, No. 5, pp. 343-350,
Oct.
2008
10.3745/KIPSTC.2008.15.5.343
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Cache Reliability Enhancing Method for Recursive DNS
Yong Wan Ju , Eung Jae Lee , Kwang Woo Nam The KIPS Transactions:PartC,
Vol. 15, No. 4, pp. 227-238,
Aug.
2008
10.3745/KIPSTC.2008.15.4.227
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Economic Damage Model on Industries due to Internet Attack and A Case Study
Jong Ho Jang , Ki Hyun Chung , Kyung Hee Choi The KIPS Transactions:PartC,
Vol. 15, No. 3, pp. 191-198,
Jun.
2008
10.3745/KIPSTC.2008.15.3.191
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study on Development of Information Security Evaluation Model
Soon Haeng Hur , Kwang Woo Lee , Hea Suk Jo , Han Jae Jeong , Woong Ryul Jeon , Dong Ho Won , Seung Joo Kim The KIPS Transactions:PartC,
Vol. 15, No. 3, pp. 173-190,
Jun.
2008
10.3745/KIPSTC.2008.15.3.173
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States
Sung Ki Kim , Jin Chul Jung , Kyung No Park , Byoung Joon Min The KIPS Transactions:PartC,
Vol. 15, No. 3, pp. 157-166,
Jun.
2008
10.3745/KIPSTC.2008.15.3.157
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Mutual Attestation Protocol using Software-based Attestation Scheme in Sensor Network Environments
Kyung Soo Heo , Hyun Woo Choi , Hyun Su Jang , Young Ik Eom The KIPS Transactions:PartC,
Vol. 15, No. 1, pp. 9-18,
Feb.
2008
10.3745/KIPSTC.2008.15.1.9
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)