Digital Library


Search: "[ keyword: ECU ]" (225)
    Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack
    Moon Seol Kang , Young Il Kim The KIPS Transactions:PartD, Vol. 17, No. 2, pp. 167-174, Apr. 2010
    10.3745/KIPSTD.2010.17.2.167


    A SAML based SSO method in RIA environment
    Dong Il Cho , Sung Yul Rhew The KIPS Transactions:PartD, Vol. 16, No. 5, pp. 809-816, Oct. 2009
    10.3745/KIPSTD.2009.16.5.809


    A Genetic Algorithm for Minimizing Query Processing Time in Distributed Database Design: Total Time Versus Response Time
    Suk Kyu Song The KIPS Transactions:PartD, Vol. 16, No. 3, pp. 295-306, Jun. 2009
    10.3745/KIPSTD.2009.16.3.295


    MDA(Model Driven Architecture) based Design for Multitasking of Heterogeneous Embedded System
    Hyun Seung Son , Woo Yeol Kim , Young Chul Kim The KIPS Transactions:PartD, Vol. 15, No. 3, pp. 355-360, Jun. 2008
    10.3745/KIPSTD.2008.15.3.355


    A Study for Method of the User Authentication and Security apply to the Type of Function password in the Embedded System and Electronic Commerce
    Eun Ser Lee , Ho Young Moon , Sang Ho Lee The KIPS Transactions:PartD, Vol. 14, No. 4, pp. 363-372, Jun. 2007
    10.3745/KIPSTD.2007.14.4.363


    The research regarding an information system risk management process characteristics
    Tai Dal Kim , Hyung Won Lee The KIPS Transactions:PartD, Vol. 14, No. 3, pp. 303-310, Jun. 2007
    10.3745/KIPSTD.2007.14.3.303


    Design and Implementation of B2Bi Collaboration Workflow System for Efficient Business Process Management based on J2EE
    Chang Mog Lee , Ok Bae Chang The KIPS Transactions:PartD, Vol. 14, No. 1, pp. 97-106, Feb. 2007
    10.3745/KIPSTD.2007.14.1.97


    A Study on Modeling Heterogeneous Embedded S/W Components based on Model Driven Architecture with Extended xUML
    Woo Yeol Kim , R. Young Chul Kim The KIPS Transactions:PartD, Vol. 14, No. 1, pp. 83-88, Feb. 2007
    10.3745/KIPSTD.2007.14.1.83


    Design and Implementation of PS-Block Timing Model Using PS-Block Structue
    Yun Kwan Kim , Won Shin , Tae Wan Kim , Chun Hyon Chang The KIPS Transactions:PartD, Vol. 13, No. 3, pp. 399-404, Jun. 2006
    10.3745/KIPSTD.2006.13.3.399


    Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location
    Seongchae Seo, Jinho You, Youngdae Kim, Byungki Kim The KIPS Transactions:PartD, Vol. 13, No. 1, pp. 67-74, Feb. 2006
    http://dx.doi.org/10.3745/KIPSTD.2006.13D.1.067
    Keywords: Security, Security requirement, Analysis