Digital Library
Search: "[ keyword: Function ]" (92)
An Improved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack
Jin Kwak , Soo Hyun Oh , Hyung Kyu Yang , Dong Ho Won The KIPS Transactions:PartC,
Vol. 11, No. 4, pp. 439-446,
Aug.
2004
10.3745/KIPSTC.2004.11.4.439
10.3745/KIPSTC.2004.11.4.439
Basis Function Truncation Effect of the Gabor Cosine and Sine Transform
Juck Sik Lee The KIPS Transactions:PartB ,
Vol. 11, No. 3, pp. 303-308,
Jun.
2004
10.3745/KIPSTB.2004.11.3.303
10.3745/KIPSTB.2004.11.3.303
Function Approximation for Reinforcement Learning using Fuzzy Clustering
Lee Yeong A , Jeong Gyeong Sug , Jeong Tae Chung The KIPS Transactions:PartB ,
Vol. 10, No. 6, pp. 587-592,
Oct.
2003
10.3745/KIPSTB.2003.10.6.587
10.3745/KIPSTB.2003.10.6.587
Digital Watermark Generation Algorithm Embedding Hangul Text
Jo Dae Je , Kim Hyeon Gi The KIPS Transactions:PartB ,
Vol. 10, No. 5, pp. 485-490,
Aug.
2003
10.3745/KIPSTB.2003.10.5.485
10.3745/KIPSTB.2003.10.5.485
An and Implementation of the Payment System using one - time Credit Information
Jong Cheol Shin, Jong Youl Park, Hyung Hyo Lee, Dong Ik Lee, Seok Hwan Yoon The KIPS Transactions:PartC,
Vol. 9, No. 3, pp. 351-358,
Jun.
2002
10.3745/KIPSTC.2002.9.3.351
10.3745/KIPSTC.2002.9.3.351
ATM Connection Admission Control Using Traffic Parameters Compression
Jin Yi Lee The KIPS Transactions:PartC,
Vol. 8, No. 3, pp. 311-318,
Jun.
2001
10.3745/KIPSTC.2001.8.3.311
10.3745/KIPSTC.2001.8.3.311
Side-channel Attack on the Final Round SHA-3 Candidate Skein
Ae Sun Park , Jong Yeon Park , Dong Guk Han , Ok Yeon Yi The KIPS Transactions:PartC,
Vol. 19, No. 3, pp. 179-184,
Jun.
2012
10.3745/KIPSTC.2012.19.3.179
10.3745/KIPSTC.2012.19.3.179
A Method of Statistical Randomness Test for Key Derivation Functions
Ju Sung Kang , Ok Yeon Yi , Ji Sun Youm , Jin Woong Cho The KIPS Transactions:PartC,
Vol. 17, No. 1, pp. 47-60,
Feb.
2010
10.3745/KIPSTC.2010.17.1.47
10.3745/KIPSTC.2010.17.1.47
An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID
Yong Soo Park , Ju Seok Shin , Myung Sil Choi , Kyung Ho Chung , Kwang Seon Ahn The KIPS Transactions:PartC,
Vol. 16, No. 6, pp. 669-680,
Dec.
2009
10.3745/KIPSTC.2009.16.6.669
10.3745/KIPSTC.2009.16.6.669
Development Testing/Evaluating Methods about Security Functions based on Digital Printer
Young Jun Cho , Kwang Woo Lee , Sung Kyu Cho , Hyun Sang Park , Hyoung Seob Lee , Hyun Seung Lee , Song Yi Kim , Wook Jae Cha , Woong Ryul Jeon , Dong Ho Won , Seung Joo The KIPS Transactions:PartC,
Vol. 16, No. 4, pp. 461-476,
Aug.
2009
10.3745/KIPSTC.2009.16.4.461
10.3745/KIPSTC.2009.16.4.461