Browse > Article List

논문
1 The Trace Analysis of SaaS from a Client's Perspective
Kang, Sung-Lim;Park, Jung-Heum;Lee, Sang-Jin; / Korea Information Processing Society , v.19C, no.1, pp.1-8,
2 An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency
Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil; / Korea Information Processing Society , v.19C, no.1, pp.9-18,
3 User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network
Kim, Jee-Hyun;Doh, In-Shil;Park, Jung-Min;Chae, Ki-Joon; / Korea Information Processing Society , v.19C, no.1, pp.19-28,
4 I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks
Park, In-Shin;Jeong, Jong-Pil; / Korea Information Processing Society , v.19C, no.1, pp.29-38,
5 Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System
Lee, Hoon-Jung;Son, Jung-Gab;Oh, Hee-Kuck; / Korea Information Processing Society , v.19C, no.1, pp.39-46,
6 Detecting Malicious Scripts in Web Contents through Remote Code Verification
Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon; / Korea Information Processing Society , v.19C, no.1, pp.47-54,
7 Security Analysis of Block Cipher KT-64
Kang, Jin-Keon;Jeong, Ki-Tae;Lee, Chang-Hoon; / Korea Information Processing Society , v.19C, no.1, pp.55-62,
8 Remote Healthcare Monitoring System Using Attribute based Encryption
Song, You-Jin;Do, Jeong-Min; / Korea Information Processing Society , v.19C, no.1, pp.63-70,
9 SePH: Seamless Proxy-based Handoff Scheme in IP-based Heterogeneous Mobile Networks
Lee, Seung-Hyun;Shin, Dong-Ryeol;Jeong, Jong-Pil; / Korea Information Processing Society , v.19C, no.1, pp.71-82,