|
1 |
Research about Benchmark System Design for Efficient Web Server Management
Kim, Seok-Soo;Song, Jae-Gu;
/
Korea convergence Security Association
, v.7, no.3, pp.1-6,
|
|
2 |
The Study for ENHPP Software Reliability Growth Model based on Superposition Coverage Function
Kim, Hee-Cheul;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.7, no.3, pp.7-13,
|
|
3 |
Concept of Strategy in Organizational Information Security
Park, Sang-Seo;
/
Korea convergence Security Association
, v.7, no.3, pp.15-24,
|
|
4 |
Research about Development Guide for Composition TOE
Song, Jae-Gu;Kim, Seok-Soo;
/
Korea convergence Security Association
, v.7, no.3, pp.25-30,
|
|
5 |
Study on RFID Mutual Authentication Protocol Using Finite Field
Ahn, Hyo-Beom;Lee, Su-Youn;
/
Korea convergence Security Association
, v.7, no.3, pp.31-37,
|
|
6 |
Performance Evaluation of Edge Detection System Based on Adaptive Directional Derivative
Kim, Eun-Mi;Park, Cherl-Soo;
/
Korea convergence Security Association
, v.7, no.3, pp.39-44,
|
|
7 |
Research about Evaluation Scoping Analysis for Composition TOE
Kim, Seok-Soo;
/
Korea convergence Security Association
, v.7, no.3, pp.45-50,
|
|
8 |
Infinite Failure NHPP Software Mixture Reliability Growth Model Base on Record Value Statistics
Kim, Hee-Cheul;Shin, Hyun-Cheul;Kim, Kyung-Soo;
/
Korea convergence Security Association
, v.7, no.3, pp.51-60,
|
|
9 |
An Experimental Study of Private Key and Secret Key Disclosure Vulnerability in Cryptographic Service Provider(CSP) Module
Park, Jin-Ho;Cho, Jae-Ik;Im, Eul-Gyu;
/
Korea convergence Security Association
, v.7, no.3, pp.61-70,
|
|
10 |
Routing Protocol for Ad-hoc Networks with Unidirectional Links
Park, Sang-Ho;
/
Korea convergence Security Association
, v.7, no.3, pp.71-78,
|
|
11 |
Design of Automatic Database Schema Generator Based on XML Schema
Lim, Jong-Seon;Kim, Kyung-Soo;
/
Korea convergence Security Association
, v.7, no.3, pp.79-86,
|
|
12 |
Mobile Point-of-Sales System
Kwon, O-Byoung;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.7, no.3, pp.87-93,
|
|
13 |
Alternate Data Stream Detection Method Using MFT Analysis Module on NTFS
Kim, Yo-Sik;Ryou, Jae-Cheol;Park, Sang-Seo;
/
Korea convergence Security Association
, v.7, no.3, pp.95-100,
|
|
14 |
Integrated OTP Authentication and Security Analysis
Kim, In-Seok;Kang, Hyung-Woo;Lim, Jong-In;
/
Korea convergence Security Association
, v.7, no.3, pp.101-107,
|
|
15 |
Analysis on Static Characteristics for Greylist-based SPIT Level Decision of VoIP SPAM Calls
Chang, Eun-Shil;Kim, Hyoug-Jong;Kang, Seung-Seok;Cho, Young-Duk;Kim, Myuhng-Joo;
/
Korea convergence Security Association
, v.7, no.3, pp.109-120,
|
|