|
1 |
Blind Signature based on Mobile Commerce
Kim, Jang-Hwan;Rhee, Chung-Sei;
/
Korea convergence Security Association
, v.8, no.2, pp.1-6,
|
|
2 |
A Study on Common Criteria for Developer's Perspective Guide
Jung, Sung-Mo;Kim, Seok-Soo;
/
Korea convergence Security Association
, v.8, no.2, pp.7-13,
|
|
3 |
The Security Risk Analysis and Economical Estimation for Convergence of Broadcasting and Communication
Kim, In-Jung;Ryou, Jeong-A;
/
Korea convergence Security Association
, v.8, no.2, pp.15-25,
|
|
4 |
Design and Implementation of Automatic System in Car Based on Zigbee
Kim, Nam-Hee;Lee, Jong-Chan;
/
Korea convergence Security Association
, v.8, no.2, pp.27-34,
|
|
5 |
The Study for Software Future Forecasting Failure Time Using ARIMA AR(1)
Kim, Hee-Cheul;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.8, no.2, pp.35-40,
|
|
6 |
Implementation of Network Traffic and QoS Monitoring System based on User Agent
Lee, Do-Hyeon;Jung, Jae-Il;
/
Korea convergence Security Association
, v.8, no.2, pp.41-50,
|
|
7 |
A Mobile Router Scheme Considering Node Property in Nested Mobile Networks
Song, Ji-Young;Park, Sang-Joon;Lee, Jong-Chan;Shin, Young-Nyo;
/
Korea convergence Security Association
, v.8, no.2, pp.51-56,
|
|
8 |
A new Fast Recovery Scheme for Resiliency of Attacked Resilient Packet Ring(RPR)
Lee, Young-Joo;Koo, Do-Jung;
/
Korea convergence Security Association
, v.8, no.2, pp.57-62,
|
|
9 |
PE Header Characteristics Analysis Technique for Malware Detection
Choi, Yang-Seo;Kim, Ik-Kyun;Oh, Jin-Tae;Ryu, Jae-Cheol;
/
Korea convergence Security Association
, v.8, no.2, pp.63-70,
|
|
10 |
Study On Integrating Internet and Intranet based on IPSec and IMA Technology
Cho, Yong-Gun;
/
Korea convergence Security Association
, v.8, no.2, pp.71-78,
|
|
11 |
Method for Supporting Multiple Service in a Mobile Terminal
Lee, Jong-Chan;Park, Sang-Joon;Lee, Jin-Kwan;
/
Korea convergence Security Association
, v.8, no.2, pp.79-85,
|
|
12 |
A Study on the Inertial Navigation System Technology
Lee, Young-Uk;
/
Korea convergence Security Association
, v.8, no.2, pp.87-94,
|
|
13 |
Multi-path Topology Aggregation Scheme of Simple Node Topology for QoS Improvement
Kim, Nam-Hee;Kim, Byun-Gon;
/
Korea convergence Security Association
, v.8, no.2, pp.95-102,
|
|
14 |
A Study on the Seeker Technology in Guided Weapon System
Lee, Young-Uk;
/
Korea convergence Security Association
, v.8, no.2, pp.103-109,
|
|
15 |
Developed Optimizing File Delete Detection Model
Kim, Yong-Ho;Yoo, Jae-Hyung;Kim, Kui-Nam J.;
/
Korea convergence Security Association
, v.8, no.2, pp.111-118,
|
|