Digital Library
KIPS Transactions on Software and Data Engineering, Vol. 15, No. 3, Jun. 2008
Analysis of Windows Vista Security System for Forensic Examination
Seong Ho Hwang , Hyun Woo Nam , Neung Soo Park , Su Hyung Jo , Do Won Hong
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 141-148, Jun. 2008
10.3745/KIPSTC.2008.15.3.141
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 141-148, Jun. 2008
10.3745/KIPSTC.2008.15.3.141
Secure JPEG2000 Steganography by the Minimization of Code-block Noise Variance Changes
Sang Moon Yoon , Hae Yeoun Lee , Jeong Chun Joo , Heung Kyu Lee
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 149-156, Jun. 2008
10.3745/KIPSTC.2008.15.3.149
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 149-156, Jun. 2008
10.3745/KIPSTC.2008.15.3.149
Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States
Sung Ki Kim , Jin Chul Jung , Kyung No Park , Byoung Joon Min
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 157-166, Jun. 2008
10.3745/KIPSTC.2008.15.3.157
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 157-166, Jun. 2008
10.3745/KIPSTC.2008.15.3.157
Fingerprinting Scheme for Contents Protection in Mobile Environment
Seung Lim Yong , Sang Ho Lee
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 167-172, Jun. 2008
10.3745/KIPSTC.2008.15.3.167
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 167-172, Jun. 2008
10.3745/KIPSTC.2008.15.3.167
A Study on Development of Information Security Evaluation Model
Soon Haeng Hur , Kwang Woo Lee , Hea Suk Jo , Han Jae Jeong , Woong Ryul Jeon , Dong Ho Won , Seung Joo Kim
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 173-190, Jun. 2008
10.3745/KIPSTC.2008.15.3.173
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 173-190, Jun. 2008
10.3745/KIPSTC.2008.15.3.173
Economic Damage Model on Industries due to Internet Attack and A Case Study
Jong Ho Jang , Ki Hyun Chung , Kyung Hee Choi
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 191-198, Jun. 2008
10.3745/KIPSTC.2008.15.3.191
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 191-198, Jun. 2008
10.3745/KIPSTC.2008.15.3.191
A Study on CAN Based System Reliability Test
Jong Hyun Kim , Ki Hyun Chung , Kyung Hee Choi
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 199-204, Jun. 2008
10.3745/KIPSTC.2008.15.3.199
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 199-204, Jun. 2008
10.3745/KIPSTC.2008.15.3.199
Designing a Path Management Method in Large-scale Multiple Sensor Networks
Yu Jin Lim , Jae Sung Park , Sang Hyun Ahn
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 205-212, Jun. 2008
10.3745/KIPSTC.2008.15.3.205
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 205-212, Jun. 2008
10.3745/KIPSTC.2008.15.3.205
Design and Evaluation of Neighbor-aware AODV Routing Protocol in Mobile Ad-hoc Network
Cheol Joong Kim , Seok Cheon Park
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 213-220, Jun. 2008
10.3745/KIPSTC.2008.15.3.213
The KIPS Transactions:PartC, Vol. 15, No. 3, pp. 213-220, Jun. 2008
10.3745/KIPSTC.2008.15.3.213