Digital Library


Search: "[ keyword: Security ]" (198)
    A Share Hardening Method for Multi-Factor Secret Sharing
    Sung Wook Chung, Min Soo Ryu KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 31-37, Jan. 2024
    https://doi.org/10.3745/KTCCS.2024.13.1.31
    Keywords: Security, Secret Sharing, Share, Hardening

    N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication
    Tae-Young Eun, Alshihri Saad, Soo-Yong Park KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 6, pp. 197-208, Jun. 2023
    https://doi.org/10.3745/KTCCS.2023.12.6.197
    Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security

    A Study on How to Build a Zero Trust Security Model
    Jin Yong Lee, Byoung Hoon Choi, Namhyun Koh, Samhyun Chun KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 6, pp. 189-196, Jun. 2023
    https://doi.org/10.3745/KTCCS.2023.12.6.189
    Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust

    Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK
    Song Gyeong Ju, Jang Kyung Bae, Sim Min Joo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 6, pp. 181-188, Jun. 2023
    https://doi.org/10.3745/KTCCS.2023.12.6.181  
    Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength

    A Study on the Activation of Sharing Cyber-ThreatInformation among Businesses
    Seokeon Choe, Jongsub Lee, Geunsun Tak, Joowon Choi KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 4, pp. 143-156, Apr. 2023
    https://doi.org/10.3745/KTCCS.2023.12.4.143
    Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model

    Requirements Analysis for Access Control Model on Ubiquitous Computing Environment
    Se Jong Oh , Je Ho Park The KIPS Transactions:PartA, Vol. 11, No. 7, pp. 563-570, Dec. 2004
    10.3745/KIPSTA.2004.11.7.563

    A Study on Application Methodology of SPDL Based onIEC 62443 Applicable to SME Environment
    Jin Jung Ha, SangSeon Park, Kim Jun Tae, Keunhee Han KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 6, pp. 193-204, Jun. 2022
    https://doi.org/10.3745/KTCCS.2022.11.6.193
    Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)

    Development of Embedded Security Fax Server Supporting Dual Mode
    Sang Hak Lee , Tae Choong Chung The KIPS Transactions:PartA, Vol. 11, No. 3, pp. 129-138, Jun. 2004
    10.3745/KIPSTA.2004.11.3.129

    Derivation of Security Requirements for Cloud Managing SecurityServices System by Threat Modeling Analysis
    Jang Hwan KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 145-154, May. 2021
    https://doi.org/10.3745/KTCCS.2021.10.5.145
    Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements

    Design of a Lightweight Security Protocol Using Post Quantum Cryptography
    Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 8, pp. 165-170, Aug. 2020
    https://doi.org/10.3745/KTCCS.2020.9.8.165  
    Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO