|
1 |
A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System
Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.6, no.1, pp.1-11,
|
|
2 |
Design and Implementation of Anti-virus Software for Server Systems supporting Dynamic Load Balancing
Choi, Ju-Young;Sung, Ji-Yeon;Bang, He-Mi;Choi, Eun-Jung;Kim, Myuhng-Joo;
/
Korea convergence Security Association
, v.6, no.1, pp.13-23,
|
|
3 |
Design of MIR Security System in Mobile Environment
Kim, Seok-Soo;Ha, Kyung-Jae;Han, Kun-Hee;
/
Korea convergence Security Association
, v.6, no.1, pp.25-32,
|
|
4 |
An Certification and a Location Tracing Protect Model on RFID
Kim, Jin-Mook;Ryou, Hwang-Bin;
/
Korea convergence Security Association
, v.6, no.1, pp.33-43,
|
|
5 |
A Lightweight RFID Authentication Protocol Based on Hash Chain
Youn, Keun-Young;Kim, Dong-Seong;Park, Jong-Sou;
/
Korea convergence Security Association
, v.6, no.1, pp.45-53,
|
|
6 |
Adaptive Absolute Delay Differentiation in Next-Generation Networks
Paik, Jung-Hoon;
/
Korea convergence Security Association
, v.6, no.1, pp.55-63,
|
|
7 |
A Study on Efficient Business Model for Mobile Virtual Network Operator
Jang, Hee-Seon;Shin, Hyun-Cheul;Han, Sung-Su;Park, Gwang-Man;
/
Korea convergence Security Association
, v.6, no.1, pp.65-74,
|
|
8 |
A Study on the CPR Security System
Kim, Seok-Soo;
/
Korea convergence Security Association
, v.6, no.1, pp.75-82,
|
|
9 |
A Study on Secure Matrix-based RFID Authentication Protocol
Lee, Su-Youn;Ahn, Hyo-Beom;
/
Korea convergence Security Association
, v.6, no.1, pp.83-90,
|
|
10 |
A Design of Embedded Prototyping System for Home Appliance
Lee, Jeong-Bae;Lee, Young-Ran;Jung, Young-Jin;Kim, Jong-Il;Kim, Nam-Dong;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.6, no.1, pp.91-103,
|
|
11 |
Design and Embodiment in Home Network at Gateway is Stabilization MSAC
Yoon, Woon-Kwan;Choi, Kyong-Ho;J. Kim, Kui-Nam;
/
Korea convergence Security Association
, v.6, no.1, pp.105-110,
|
|