Digital Library


Search: "[ keyword: R ]" (4044)
    Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph
    Kyungbaek Kim KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 533-540, Dec. 2013
    10.3745/KTCCS.2013.2.12.533

    A Study on the SmartPhone GPS based Graphical Password Approach
    Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 525-532, Dec. 2013
    10.3745/KTCCS.2013.2.12.525

    A Study on Data Storage and Recovery in Hadoop Environment
    Su Hyun Kim , Im Yeong Lee KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 569-576, Dec. 2013
    10.3745/KTCCS.2013.2.12.569

    Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
    Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 561-568, Dec. 2013
    10.3745/KTCCS.2013.2.12.561

    Design and Implementation of DRM Proxy for DRM Cloud Service
    Hyejoo Lee , Changsoo Heo , Changho Seo , Sang Uk Shin KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 553-560, Dec. 2013
    10.3745/KTCCS.2013.2.12.553

    An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
    Myong Hee Kim , Wildan Toyib KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 541-552, Dec. 2013
    10.3745/KTCCS.2013.2.12.541

    Zero-knowledge Based User Remote Authentication Over Elliptic Curve
    Jong Seok Choi , Ho Won Kim KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 517-524, Dec. 2013
    10.3745/KTCCS.2013.2.12.517

    A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme
    Jeong Hyo Park , Yong Hoon Jung , Moon Seog Jun KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 511-516, Dec. 2013
    10.3745/KTCCS.2013.2.12.511

    A Secure Protocol for Location-Aware Services in VANETs
    Chul Sur , Young Ho Park , Kyung Hyune Rhee KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 11, pp. 495-502, Nov. 2013
    10.3745/KTCCS.2013.2.11.495

    A Monitoring Tool for Personal Information Leakage Prevention in Network Packets
    Tea Kyung Ju , Chong Min Hong , Weon Shin KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 11, pp. 489-494, Nov. 2013
    10.3745/KTCCS.2013.2.11.489