Digital Library
Search: "[ keyword: Security ]" (165)
A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini
Jong Phil Yang , Kyung Hyune Rhee The KIPS Transactions:PartC,
Vol. 13, No. 1, pp. 27-34,
Feb.
2006
10.3745/KIPSTC.2006.13.1.27
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Profile based Web Application Attack Detection and Filtering Method
Young Tae Yun , Jae Cheol Ryou , Sang Seo Park , Jong Wook Park The KIPS Transactions:PartC,
Vol. 13, No. 1, pp. 19-26,
Feb.
2006
10.3745/KIPSTC.2006.13.1.19
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Master Integrity Principle for Effective Management of Role Hierarchy
Se Jong Oh The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 981-988,
Dec.
2005
10.3745/KIPSTC.2005.12.7.981
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design of User Authentication and DRM Security System Using Security Agent
Jung Jae Kim , Kyung Seog Lee , Moon Seog Jun The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 973-980,
Dec.
2005
10.3745/KIPSTC.2005.12.7.973
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID)
Jae Hyun Choi , Woo Jin Lee , Ki Won Chong The KIPS Transactions:PartC,
Vol. 12, No. 7, pp. 965-972,
Dec.
2005
10.3745/KIPSTC.2005.12.7.965
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
Jung Sook Jang , Yong Hee Jeon , Jong Soo Jang The KIPS Transactions:PartC,
Vol. 12, No. 6, pp. 817-826,
Oct.
2005
10.3745/KIPSTC.2005.12.6.817
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Comparative Study on the Information Security Strategy of Korean E-Government with Defense-in-Depth Strategy of DoD
Woon Ho Song , Wook Jae Jeong , Joon Bum Kim , Han Seung Kang The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 659-664,
Oct.
2005
10.3745/KIPSTC.2005.12.5.659
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Implementation of ACM-based Web Security Access Control System for Intranet Security
Nam Deok Cho , Hyun Gun Park The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 643-648,
Oct.
2005
10.3745/KIPSTC.2005.12.5.643
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System
Chang Yeol Choi , Sung Soo Kim The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 633-642,
Oct.
2005
10.3745/KIPSTC.2005.12.5.633
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Secure Routing Mechanism using one-time digital signature in Ad-hoc Networks
Hye Jin Pyeon , In Shil Doh , Ki Joon Chae The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 623-632,
Oct.
2005
10.3745/KIPSTC.2005.12.5.623
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)