Digital Library


Search: "[ keyword: ECU ]" (225)
    A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System
    Chang Yeol Choi , Sung Soo Kim The KIPS Transactions:PartC, Vol. 12, No. 5, pp. 633-642, Oct. 2005
    10.3745/KIPSTC.2005.12.5.633


    Secure Routing Mechanism using one-time digital signature in Ad-hoc Networks
    Hye Jin Pyeon , In Shil Doh , Ki Joon Chae The KIPS Transactions:PartC, Vol. 12, No. 5, pp. 623-632, Oct. 2005
    10.3745/KIPSTC.2005.12.5.623


    Boundary Zone Overlapping Scheme for Fast Handoff Based on Session Key Reuse
    Yu Mi Choi , Min Young Chung , Hyun Seung Choo The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 481-488, Aug. 2005
    10.3745/KIPSTC.2005.12.4.481


    Cluster-based Pairwise Key Establishment in Wireless Sensor Networks
    Eun Mi Chun , In Shil Doh , Ha Young Oh , So Young Park , Joo Young Lee , Ki Joon Chae , Sang Ho Lee , Jae Hoon Nah The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 473-480, Aug. 2005
    10.3745/KIPSTC.2005.12.4.473


    Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN
    Sung Ryoul Lee , Ji Myung Kang , Ho Gun Moon , Myung Soo Lee , Chong Kwon Kim The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 465-472, Aug. 2005
    10.3745/KIPSTC.2005.12.4.465


    Design and Implementation of Security System for Wargame Simulation System
    Jong Seok Song , Jin Soo Kim , Moon Sun Shin , Keun Ho Ryu The KIPS Transactions:PartC, Vol. 12, No. 3, pp. 369-378, Jun. 2005
    10.3745/KIPSTC.2005.12.3.369


    A Study on Security of E-Government Service Based on Web Service
    Eun Seon Lee , Jin Seok Yang , Jung Muk Lim , Ki Young Moon , Jae Seung Lee , Tai Myoung Chung The KIPS Transactions:PartC, Vol. 12, No. 3, pp. 347-360, Jun. 2005
    10.3745/KIPSTC.2005.12.3.347


    Design and Implementation of a Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security
    Jong Il Jeong , Seok Hwan Yu , Dong Kyoo Shin , Dong Il Shin , Moo Hong Cha The KIPS Transactions:PartC, Vol. 12, No. 3, pp. 339-346, Jun. 2005
    10.3745/KIPSTC.2005.12.3.339


    Packet Replacement Technique for Securing Anonymity in P2P Network
    Byung Ryong Kim , Ki Chang Kim The KIPS Transactions:PartC, Vol. 12, No. 3, pp. 331-338, Jun. 2005
    10.3745/KIPSTC.2005.12.3.331


    A Study on Utilization of CC Security Function Components in IT Security Products
    Sung Ja Choi , Sang Soo Choi , Gang Soo Lee The KIPS Transactions:PartC, Vol. 12, No. 2, pp. 207-216, Apr. 2005
    10.3745/KIPSTC.2005.12.2.207