|
1 |
The Trace Analysis of SaaS from a Client's Perspective
Kang, Sung-Lim;Park, Jung-Heum;Lee, Sang-Jin;
/
Korea Information Processing Society
, v.19C, no.1, pp.1-8,
|
|
2 |
An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency
Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil;
/
Korea Information Processing Society
, v.19C, no.1, pp.9-18,
|
|
3 |
User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network
Kim, Jee-Hyun;Doh, In-Shil;Park, Jung-Min;Chae, Ki-Joon;
/
Korea Information Processing Society
, v.19C, no.1, pp.19-28,
|
|
4 |
I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks
Park, In-Shin;Jeong, Jong-Pil;
/
Korea Information Processing Society
, v.19C, no.1, pp.29-38,
|
|
5 |
Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System
Lee, Hoon-Jung;Son, Jung-Gab;Oh, Hee-Kuck;
/
Korea Information Processing Society
, v.19C, no.1, pp.39-46,
|
|
6 |
Detecting Malicious Scripts in Web Contents through Remote Code Verification
Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon;
/
Korea Information Processing Society
, v.19C, no.1, pp.47-54,
|
|
7 |
Security Analysis of Block Cipher KT-64
Kang, Jin-Keon;Jeong, Ki-Tae;Lee, Chang-Hoon;
/
Korea Information Processing Society
, v.19C, no.1, pp.55-62,
|
|
8 |
Remote Healthcare Monitoring System Using Attribute based Encryption
Song, You-Jin;Do, Jeong-Min;
/
Korea Information Processing Society
, v.19C, no.1, pp.63-70,
|
|
9 |
SePH: Seamless Proxy-based Handoff Scheme in IP-based Heterogeneous Mobile Networks
Lee, Seung-Hyun;Shin, Dong-Ryeol;Jeong, Jong-Pil;
/
Korea Information Processing Society
, v.19C, no.1, pp.71-82,
|
|