Browse > Article List

논문
1 Blind Signature based on Mobile Commerce
Kim, Jang-Hwan;Rhee, Chung-Sei; / Korea convergence Security Association , v.8, no.2, pp.1-6,
2 A Study on Common Criteria for Developer's Perspective Guide
Jung, Sung-Mo;Kim, Seok-Soo; / Korea convergence Security Association , v.8, no.2, pp.7-13,
3 The Security Risk Analysis and Economical Estimation for Convergence of Broadcasting and Communication
Kim, In-Jung;Ryou, Jeong-A; / Korea convergence Security Association , v.8, no.2, pp.15-25,
4 Design and Implementation of Automatic System in Car Based on Zigbee
Kim, Nam-Hee;Lee, Jong-Chan; / Korea convergence Security Association , v.8, no.2, pp.27-34,
5 The Study for Software Future Forecasting Failure Time Using ARIMA AR(1)
Kim, Hee-Cheul;Shin, Hyun-Cheul; / Korea convergence Security Association , v.8, no.2, pp.35-40,
6 Implementation of Network Traffic and QoS Monitoring System based on User Agent
Lee, Do-Hyeon;Jung, Jae-Il; / Korea convergence Security Association , v.8, no.2, pp.41-50,
7 A Mobile Router Scheme Considering Node Property in Nested Mobile Networks
Song, Ji-Young;Park, Sang-Joon;Lee, Jong-Chan;Shin, Young-Nyo; / Korea convergence Security Association , v.8, no.2, pp.51-56,
8 A new Fast Recovery Scheme for Resiliency of Attacked Resilient Packet Ring(RPR)
Lee, Young-Joo;Koo, Do-Jung; / Korea convergence Security Association , v.8, no.2, pp.57-62,
9 PE Header Characteristics Analysis Technique for Malware Detection
Choi, Yang-Seo;Kim, Ik-Kyun;Oh, Jin-Tae;Ryu, Jae-Cheol; / Korea convergence Security Association , v.8, no.2, pp.63-70,
10 Study On Integrating Internet and Intranet based on IPSec and IMA Technology
Cho, Yong-Gun; / Korea convergence Security Association , v.8, no.2, pp.71-78,
11 Method for Supporting Multiple Service in a Mobile Terminal
Lee, Jong-Chan;Park, Sang-Joon;Lee, Jin-Kwan; / Korea convergence Security Association , v.8, no.2, pp.79-85,
12 A Study on the Inertial Navigation System Technology
Lee, Young-Uk; / Korea convergence Security Association , v.8, no.2, pp.87-94,
13 Multi-path Topology Aggregation Scheme of Simple Node Topology for QoS Improvement
Kim, Nam-Hee;Kim, Byun-Gon; / Korea convergence Security Association , v.8, no.2, pp.95-102,
14 A Study on the Seeker Technology in Guided Weapon System
Lee, Young-Uk; / Korea convergence Security Association , v.8, no.2, pp.103-109,
15 Developed Optimizing File Delete Detection Model
Kim, Yong-Ho;Yoo, Jae-Hyung;Kim, Kui-Nam J.; / Korea convergence Security Association , v.8, no.2, pp.111-118,