Digital Library
KIPS Transactions on Software and Data Engineering, Vol. 19, No. 1, Feb. 2012
The Trace Analysis of SaaS from a Client`s Perspective
Sung Lim Kang , Jung Heum Park , Sang Jin Lee
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 1-8, Feb. 2012
10.3745/KIPSTC.2012.19.1.1
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 1-8, Feb. 2012
10.3745/KIPSTC.2012.19.1.1
An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency
Hae Soon Ahn , Eun Jun Yoon , In Gil Nam
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 9-18, Feb. 2012
10.3745/KIPSTC.2012.19.1.9
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 9-18, Feb. 2012
10.3745/KIPSTC.2012.19.1.9
User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network
Jee Hyun Kim , In Shil Doh , Jung Min Park , Ki Joon Chae
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 19-28, Feb. 2012
10.3745/KIPSTC.2012.19.1.19
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 19-28, Feb. 2012
10.3745/KIPSTC.2012.19.1.19
An Improved Identity Management Protocol for Internet Applications in Mobile Networks
In Shin Park , Jong Pil Jeong
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 29-38, Feb. 2012
10.3745/KIPSTC.2012.19.1.29
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 29-38, Feb. 2012
10.3745/KIPSTC.2012.19.1.29
Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System
Hoon Jung Lee , Jung Gab Son , Hee Kuck Oh
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 39-46, Feb. 2012
10.3745/KIPSTC.2012.19.1.39
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 39-46, Feb. 2012
10.3745/KIPSTC.2012.19.1.39
Detecting Malicious Scripts in Web Contents through Remote Code Verification
Jae Yeong Choi , Sung Ki Kim , Hyuk Jun Lee , Byoung Joon Min
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 47-54, Feb. 2012
10.3745/KIPSTC.2012.19.1.47
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 47-54, Feb. 2012
10.3745/KIPSTC.2012.19.1.47
Security Analysis of Block Cipher KT-64
Jin Keon Kang , Ki Tae Jeong , Chang Hoon Lee
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 55-62, Feb. 2012
10.3745/KIPSTC.2012.19.1.55
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 55-62, Feb. 2012
10.3745/KIPSTC.2012.19.1.55
Remote Healthcare Monitoring System Using Attribute based Encryption
You Jin Song , Jeong Min Do
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 63-70, Feb. 2012
10.3745/KIPSTC.2012.19.1.63
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 63-70, Feb. 2012
10.3745/KIPSTC.2012.19.1.63
Seamless Proxy-based Handoff Scheme in IP-based Heterogeneous Mobile Networks
Seung Hyun Lee , Dong Ryeol Shin , Jong Pil Jeong
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 71-82, Feb. 2012
10.3745/KIPSTC.2012.19.1.71
The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 71-82, Feb. 2012
10.3745/KIPSTC.2012.19.1.71