Digital Library
Search: "[ keyword: Security ]" (165)
A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks
Il Sun You , Jong Eun Kim , Kyung San Cho The KIPS Transactions:PartC,
Vol. 10, No. 1, pp. 1-10,
Feb.
2003
10.3745/KIPSTC.2003.10.1.1
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study on Generalization of Security Policies for Enterprise Security Management System
Hyun H. Choi , Tai M. Chung The KIPS Transactions:PartC,
Vol. 9, No. 6, pp. 823-830,
Dec.
2002
10.3745/KIPSTC.2002.9.6.823
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Proposing a PRNG based on a block cipher and cryptanalyzing its security
Jung Hwan Song , Jin Su Hyun , Bon Wook Koo , Ku Young Chang The KIPS Transactions:PartC,
Vol. 9, No. 6, pp. 809-816,
Dec.
2002
10.3745/KIPSTC.2002.9.6.809
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
The Implementation of Policy Management Tool Based on Network Security Policy Information Model
Geon Lyang Kim , Jong Soo Jang , Sung Won Sohn The KIPS Transactions:PartC,
Vol. 9, No. 5, pp. 775-782,
Oct.
2002
10.3745/KIPSTC.2002.9.5.775
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Provable Security of 3GPP Integrity Algorithm f9
Do Won Hong, Sang Uk Shin, Heui Su Ryu, Kyo Il Chung The KIPS Transactions:PartC,
Vol. 9, No. 4, pp. 573-580,
Aug.
2002
10.3745/KIPSTC.2002.9.4.573
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Robust Speaker Identification Method Based on the Wavelet Filter Banks
Dae Jong Lee, Keun Chang Kwak, Jeong Woong Ryu, Myung Geun Chun The KIPS Transactions:PartC,
Vol. 9, No. 4, pp. 459-466,
Aug.
2002
10.3745/KIPSTC.2002.9.4.459
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Improving Compiler to Prevent Buffer Overflow Attack
Jong Ewi Kim, Seong Uck Lee, Man Pyo Hong The KIPS Transactions:PartC,
Vol. 9, No. 4, pp. 453-458,
Aug.
2002
10.3745/KIPSTC.2002.9.4.453
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Key Distribution Protocol for Secure Multicasting in Large Dynamic Groups
Tae Yeon Kim, Young Kyoon Kim The KIPS Transactions:PartC,
Vol. 9, No. 4, pp. 597-604,
Aug.
2002
10.3745/KIPSTC.2002.9.4.597
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Design and Implementation of A Rule - based Security Evaluation System for IP Security Engine
Hyeok Chan Kwon, Jung Sik Hyun, Sang Choon Kim, Jae Hoon Na, Sung Won Son The KIPS Transactions:PartC,
Vol. 9, No. 3, pp. 367-374,
Jun.
2002
10.3745/KIPSTC.2002.9.3.367
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
An Implementation of Authentication and Encryption of Multimedia Conference using H.235 Protocol
Gyu Bok Sim, Keon Bae Lee, Dong Su Seong The KIPS Transactions:PartC,
Vol. 9, No. 3, pp. 343-350,
Jun.
2002
10.3745/KIPSTC.2002.9.3.343
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)