Browse > Article List

논문
1 Alert Correlation Analysis based on Clustering Technique for IDS
Shin, Moon-Sun;Moon, Ho-Sung;Ryu, Keun-Ho;Jang, Jong-Su; / Korea Information Processing Society , v.10C, no.6, pp.665-674,
2 Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication
Kim, Ik-Su;Kim, Myung-Ho; / Korea Information Processing Society , v.10C, no.6, pp.675-682,
3 X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data
Lee, Suk-Kyoon;Kim, Dong-Ah; / Korea Information Processing Society , v.10C, no.6, pp.683-694,
4 Design and Implementation of Mobile Security System for Digital contents Rights Protection in Wireless Internet Environment
Kim, Hoo-Jong;Na, Seung-Won; / Korea Information Processing Society , v.10C, no.6, pp.695-704,
5 Hybrid Statistical Learning Model for Intrusion Detection of Networks
Jun, Sung-Hae; / Korea Information Processing Society , v.10C, no.6, pp.705-710,
6 An Internet Time Synchronization Model using Dynamic Linear Model
Yu, Dong-Hui;Hwang, So-Young;Kim, Yong-Ho; / Korea Information Processing Society , v.10C, no.6, pp.711-716,
7 Design and Implementation of the Intrusion Detection Pattern Algorithm Based on Data Mining
Lee, Sang-Hoon;Soh, Jin; / Korea Information Processing Society , v.10C, no.6, pp.717-726,
8 Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System
Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won; / Korea Information Processing Society , v.10C, no.6, pp.727-738,
9 Design of Privilege Delegation Mechanism using Proxy Certificate
Jin, Seung-Hun;Cho, Sang-Rae;Kim, Tae-Sung;Ryou, Jae-Cheol; / Korea Information Processing Society , v.10C, no.6, pp.739-746,
10 Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card
Sung, Soon-Hwa;Kong, Eun-Bae; / Korea Information Processing Society , v.10C, no.6, pp.747-754,
11 Comparison and Analysis of Protocols for the Secure Binding Updates in MIPv6
Won, You-Seuk;Cho, Kyung-San; / Korea Information Processing Society , v.10C, no.6, pp.755-762,
12 A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography
You, Il-Sun;Cho, Kyung-San; / Korea Information Processing Society , v.10C, no.6, pp.763-768,
13 A Study on Key Information Service Protocol for Secure XML Web Service
Park, Nam-Je;Moon, Ki-Young;Sohn, Sung-Won; / Korea Information Processing Society , v.10C, no.6, pp.769-778,
14 A Correction Security Framework for Reliable Internet Services
Lee, Seung-Min;Nam, Taek-Yong;Sohn, Sung-Won;Han, Chi-Moon; / Korea Information Processing Society , v.10C, no.6, pp.779-786,
15 Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment
Choi, Kil-Hwan;Shin, Min-Hwa;Bae, Sang-Hyun; / Korea Information Processing Society , v.10C, no.6, pp.787-792,
16 An Access Control using SPKI Certificate in Peer-to-Peer Environment
Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune; / Korea Information Processing Society , v.10C, no.6, pp.793-798,
17 A Study on Survivability of Node using Response Mechanism in Active Network Environment
Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung; / Korea Information Processing Society , v.10C, no.6, pp.799-808,
18 A Group Key Management for Real-Time Multicasting Information Security
Hong, Jong-Joon;Hwang, Kyo-Chul; / Korea Information Processing Society , v.10C, no.6, pp.809-814,
19 PRISM: A Preventive and Risk-reducing Integrated Security Management Model using Security Label
Kim, Dong-Soo;Kim, Tae-Kyung;Chung, Tai-Myoung; / Korea Information Processing Society , v.10C, no.6, pp.815-824,
20 Distributed Secure Mail System For Roaming User
Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune; / Korea Information Processing Society , v.10C, no.6, pp.825-834,