Digital Library

KIPS Transactions on Software and Data Engineering, Vol. 12, No. 7, Dec. 2005


An Efficient Variant of Self-Healing Group Key Distribution Scheme with Revocation Capability
Ju Sung Kang , Do Won Hong
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 941-948, Dec. 2005
10.3745/KIPSTC.2005.12.7.941

Pairwise Key Agreement Protocols Using Randomness Re-use Technique
Ik Rae Jeong , Dong Hoon Lee
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 949-958, Dec. 2005
10.3745/KIPSTC.2005.12.7.949

Enhanced ID-based Authentication Scheme using Smartcards and Fingerprints
Il Soo Jeon , Hyun Sung Kim
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 959-964, Dec. 2005
10.3745/KIPSTC.2005.12.7.959

An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID)
Jae Hyun Choi , Woo Jin Lee , Ki Won Chong
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 965-972, Dec. 2005
10.3745/KIPSTC.2005.12.7.965

Design of User Authentication and DRM Security System Using Security Agent
Jung Jae Kim , Kyung Seog Lee , Moon Seog Jun
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 973-980, Dec. 2005
10.3745/KIPSTC.2005.12.7.973

Master Integrity Principle for Effective Management of Role Hierarchy
Se Jong Oh
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 981-988, Dec. 2005
10.3745/KIPSTC.2005.12.7.981

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems
In Jung Kim , Young Gyo Lee , Yoon Jung Chung , Dong Ho Won
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 989-998, Dec. 2005
10.3745/KIPSTC.2005.12.7.989

Efficient Techniques to Secure User Data in the Secure OS for a Multi-user Environment
Sun Il Ahn , Sang Yong Han
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 999-1006, Dec. 2005
10.3745/KIPSTC.2005.12.7.999

Selection of Detection Measures using Relative Entropy based on Network Connections
Gil Jong Mun , Yong Min Kim , Dong Kook Kim , Bong Nam Noh
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1007-1014, Dec. 2005
10.3745/KIPSTC.2005.12.7.1007

A Specification for Restricted Delegation to suitable on Distributed Computing
Seung Hee Eun , Yong Min Kim , Bong Nam Noh
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1015-1024, Dec. 2005
10.3745/KIPSTC.2005.12.7.1015

Performance Analysis of Transmit Weights Optimization for Cooperative Communications in Wireless Networks
Hyung Yun Kong
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1025-1030, Dec. 2005
10.3745/KIPSTC.2005.12.7.1025

Interconnection Scheme for Multiple Path Source Routing Protocol for Wireless Mobile Ad-hoc Network and Mobile-IP
Moon Jeong Kim , Young Ik Eom
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1031-1038, Dec. 2005
10.3745/KIPSTC.2005.12.7.1031

An Effective Solution to Overcome the Restriction of SACK Blocks` Number in TCP SACK
Lin Cui , Choong Seon Hong
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1039-1046, Dec. 2005
10.3745/KIPSTC.2005.12.7.1039

A Scheme for Return Channel Utilization for Efficient Download of Data Broadcasting Applications
Seung Mi Kang , Seung Sang Sun , Young Ik Eom
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1047-1056, Dec. 2005
10.3745/KIPSTC.2005.12.7.1047

Extending a WebDAV Protocol to Efficiently Support the Management of User Properties
Hye Young Jung , Dong Ho Kim , Geon Tae Ahn , Myung Joon Lee
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1057-1066, Dec. 2005
10.3745/KIPSTC.2005.12.7.1057

Application of Korean Alphabet Domain-Names for Convenient Information Access in a Ubiquitous Information Network
Yung Bok Kim
The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 1067-1074, Dec. 2005
10.3745/KIPSTC.2005.12.7.1067