|
1 |
An Authentication Scheme for Filtering Injected Bogus Data in Sensor Networks
Cho, Kwan-Tae;Kim, Young-Ho;Lee, Dong-Hoon;
/
Korea Information Processing Society
, v.14C, no.5, pp.389-394,
|
|
2 |
A Short Path Data Routing Protocol for Wireless Sensor Network
Ahn, Kwang-Seon;
/
Korea Information Processing Society
, v.14C, no.5, pp.395-402,
|
|
3 |
A Secure Data Transmission Mechanism for Sensor Network Communication
Doh, In-Shil;Chae, Ki-Joon;
/
Korea Information Processing Society
, v.14C, no.5, pp.403-410,
|
|
4 |
Design of the Covered Address Generation using the Super Increasing Sequence in Wireless Networks
Choun, Jun-Ho;Kim, Sung-Chan;Jang, Kun-Won;Do, Kyung-Hwa;Jun, Moon-Seog;
/
Korea Information Processing Society
, v.14C, no.5, pp.411-416,
|
|
5 |
Performance Analysis of Routing Protocols for WLAN Mesh Networks
Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun;
/
Korea Information Processing Society
, v.14C, no.5, pp.417-424,
|
|
6 |
An Efficient Route Discovery using Adaptive Expanding Ring Search in AODV-based MANETs
Han, Seung-Jin;
/
Korea Information Processing Society
, v.14C, no.5, pp.425-430,
|
|
7 |
A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division
Kang, Soo-Young;Lee, Im-Yeong;
/
Korea Information Processing Society
, v.14C, no.5, pp.431-438,
|
|
8 |
On the Privacy Preserving Mining Association Rules by using Randomization
Kang, Ju-Sung;Cho, Sung-Hoon;Yi, Ok-Yeon;Hong, Do-Won;
/
Korea Information Processing Society
, v.14C, no.5, pp.439-452,
|
|
9 |
Protocol-independent Information Modeling and Web Services Implementation for Resource Management in NGN Transport Stratum
Yim, Young-Eun;Kwon, Tae-Hyun;Kim, Choon-Hee;Han, Tae-Man;Jeong, You-Hyeon;Cha, Young-Wook;
/
Korea Information Processing Society
, v.14C, no.5, pp.453-462,
|
|