Digital Library
Search: "[ keyword: Security ]" (165)
An Improved Detection System for the Network Vulnerability Scan Attacks
Il Sun You, Kyung San Cho The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 543-550,
Oct.
2001
10.3745/KIPSTC.2001.8.5.543
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
An Integrated Authentication System for Mobile Codes
Sung Hoon Bae, Su Hyun Lee The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 535-542,
Oct.
2001
10.3745/KIPSTC.2001.8.5.535
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Iris Pattern Recognition for Personal Identification and Authentication Algorithm
Hyoun Joo Go, Sang Woo Lee, Myung Geun Chun The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 499-506,
Oct.
2001
10.3745/KIPSTC.2001.8.5.499
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance
Gu Heon Jeong , Dong Wook Yi , Seung Ryul Jeong The KIPS Transactions:PartD,
Vol. 17, No. 3, pp. 223-232,
Jun.
2010
10.3745/KIPSTD.2010.17.3.223
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack
Moon Seol Kang , Young Il Kim The KIPS Transactions:PartD,
Vol. 17, No. 2, pp. 167-174,
Apr.
2010
10.3745/KIPSTD.2010.17.2.167
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A SAML based SSO method in RIA environment
Dong Il Cho , Sung Yul Rhew The KIPS Transactions:PartD,
Vol. 16, No. 5, pp. 809-816,
Oct.
2009
10.3745/KIPSTD.2009.16.5.809
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study for Method of the User Authentication and Security apply to the Type of Function password in the Embedded System and Electronic Commerce
Eun Ser Lee , Ho Young Moon , Sang Ho Lee The KIPS Transactions:PartD,
Vol. 14, No. 4, pp. 363-372,
Jun.
2007
10.3745/KIPSTD.2007.14.4.363
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location
Seongchae Seo, Jinho You, Youngdae Kim, Byungki Kim The KIPS Transactions:PartD,
Vol. 13, No. 1, pp. 67-74,
Feb.
2006
http://dx.doi.org/10.3745/KIPSTD.2006.13D.1.067
Keywords: Security, Security requirement, Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Keywords: Security, Security requirement, Analysis
A Secure Digital Content Delivery System with Improved Latency time
Yun Ji Na , Il Seok Ko The KIPS Transactions:PartD,
Vol. 12, No. 2, pp. 303-308,
Apr.
2005
10.3745/KIPSTD.2005.12.2.303
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
System for Anti-Piracy of Software under Windows Operating System
Hwang Gi Tae , Kim Nam Yun The KIPS Transactions:PartD,
Vol. 11, No. 2, pp. 423-434,
Apr.
2004
10.3745/KIPSTD.2004.11.2.423
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)