Digital Library
Search: "[ keyword: ECU ]" (225)
Design and Implementation of a Keyboard Input Security System for Safe and Trusted E-Commerce
Sung Wook Choi , Ki Tae Kim The KIPS Transactions:PartC,
Vol. 13, No. 1, pp. 55-62,
Feb.
2006
10.3745/KIPSTC.2006.13.1.55
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini
Jong Phil Yang , Kyung Hyune Rhee The KIPS Transactions:PartC,
Vol. 13, No. 1, pp. 27-34,
Feb.
2006
10.3745/KIPSTC.2006.13.1.27
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Profile based Web Application Attack Detection and Filtering Method
Young Tae Yun , Jae Cheol Ryou , Sang Seo Park , Jong Wook Park The KIPS Transactions:PartC,
Vol. 13, No. 1, pp. 19-26,
Feb.
2006
10.3745/KIPSTC.2006.13.1.19
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Efficient Techniques to Secure User Data in the Secure OS for a Multi-user Environment
Sun Il Ahn , Sang Yong Han The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 999-1006,
Dec.
2005
10.3745/KIPSTC.2005.12.7.999
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Master Integrity Principle for Effective Management of Role Hierarchy
Se Jong Oh The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 981-988,
Dec.
2005
10.3745/KIPSTC.2005.12.7.981
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design of User Authentication and DRM Security System Using Security Agent
Jung Jae Kim , Kyung Seog Lee , Moon Seog Jun The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 973-980,
Dec.
2005
10.3745/KIPSTC.2005.12.7.973
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID)
Jae Hyun Choi , Woo Jin Lee , Ki Won Chong The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 965-972,
Dec.
2005
10.3745/KIPSTC.2005.12.7.965
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
Jung Sook Jang , Yong Hee Jeon , Jong Soo Jang The KIPS Transactions:PartC,
Vol. 12, No. 6, pp. 817-826,
Oct.
2005
10.3745/KIPSTC.2005.12.6.817
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Comparative Study on the Information Security Strategy of Korean E-Government with Defense-in-Depth Strategy of DoD
Woon Ho Song , Wook Jae Jeong , Joon Bum Kim , Han Seung Kang The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 659-664,
Oct.
2005
10.3745/KIPSTC.2005.12.5.659
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Implementation of ACM-based Web Security Access Control System for Intranet Security
Nam Deok Cho , Hyun Gun Park The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 643-648,
Oct.
2005
10.3745/KIPSTC.2005.12.5.643
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)