Browse > Article List

논문
1 Analysis of Windows Vista Security System for Forensic Examination
Hwang, Seong-Ho;Nam, Hyun-Woo;Park, Neung-Soo;Jo, Su-Hyung;Hong, Do-Won; / Korea Information Processing Society , v.15C, no.3, pp.141-148,
2 Secure JPEG2000 Steganography by the Minimization of Code-block Noise Variance Changes
Yoon, Sang-Moon;Lee, Hae-Yeoun;Joo, Jeong-Chun;Bui, Cong-Nguyen;Lee, Heung-Kyu; / Korea Information Processing Society , v.15C, no.3, pp.149-156,
3 Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States
Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon; / Korea Information Processing Society , v.15C, no.3, pp.157-166,
4 Fingerprinting Scheme for Contents Protection in Mobile Environment
Yong, Seung-Lim;Lee, Sang-Ho; / Korea Information Processing Society , v.15C, no.3, pp.167-172,
5 A Study on Development of Information Security Evaluation Model
Hur, Soon-Haeng;Lee, Kwang-Woo;Jo, Hea-Suk;Jeong, Han-Jae;Jeon, Woong-Ryul;Won, Dong-Ho;Kim, Seung-Joo; / Korea Information Processing Society , v.15C, no.3, pp.173-190,
6 Economic Damage Model on Industries due to Internet Attack and A Case Study
Jang, Jong-Ho;Chung, Ki-Hyun;Choi, Kyung-Hee; / Korea Information Processing Society , v.15C, no.3, pp.191-198,
7 A Study on CAN Based System Reliability Test
Kim, Jong-Hyun;Chung, Ki-Hyun;Choi, Kyung-Hee; / Korea Information Processing Society , v.15C, no.3, pp.199-204,
8 Designing a Path Management Method in Large-scale Multiple Sensor Networks
Lim, Yu-Jin;Park, Jae-Sung;Ahn, Sang-Hyun; / Korea Information Processing Society , v.15C, no.3, pp.205-212,
9 Design and Evaluation of Neighbor-aware AODV Routing Protocol in Mobile Ad-hoc Network
Kim, Cheol-Joong;Park, Seok-Cheon; / Korea Information Processing Society , v.15C, no.3, pp.213-220,