Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, Oct. 2003


A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent
Kim Tae Gyeong , Lee Dong Yeong , Jeong Tae Myeong
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 525-532, Oct. 2003
10.3745/KIPSTC.2003.10.5.525

An One-time Proxy Signature Scheme Suitable for Mobile Communications
Kim So Jin , Park Ji Hwan
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 533-540, Oct. 2003
10.3745/KIPSTC.2003.10.5.533

How to Exchange Secrets by OT
Lee Yong Ju , Choe Yeong Il , Lee Byeong Seon
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 541-548, Oct. 2003
10.3745/KIPSTC.2003.10.5.541

Extended Security Policy Protocol that considers NAT-PT
Hyeon Jeong Sig , Hwang Yun Cheol , Eom Nam Gyeong , Lee Sang Ho
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 549-556, Oct. 2003
10.3745/KIPSTC.2003.10.5.549

A Study on Smartcard Security Evaluation Criteria for Side-Channel Attacks
Lee Hun Jae , Lee Sang Gon , Choe Hui Bong , Kim Chun Su
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 557-564, Oct. 2003
10.3745/KIPSTC.2003.10.5.557

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems
Yu Il Seon , Lee Dong Lyeon , O Eun Sug
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 565-574, Oct. 2003
10.3745/KIPSTC.2003.10.5.565

Design and Implementation of Digital Contract System on the Mobile Environment: M-XContract
Hwang Gi Tae , Kim Nam Yun
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 575-584, Oct. 2003
10.3745/KIPSTC.2003.10.5.575

Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card
Lee Ju Hwa , Seol Gyeong Su , Jeong Min Su
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 585-594, Oct. 2003
10.3745/KIPSTC.2003.10.5.585

A buffer management scheme of GFR Service for fairness improvement of TCP/IF traffic
Gwag Hyeon Min , Kim Nam Hui , Lee Sang Tae , Jeon Byeong Sil
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 595-602, Oct. 2003
10.3745/KIPSTC.2003.10.5.595

Backup path restoration scheme and delay time analysis in GMPLS network
Jo Pyeong Dong , Kim Sang Ha
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 603-610, Oct. 2003
10.3745/KIPSTC.2003.10.5.603

Study on Dynamic Priority Collision Resolution Algorithm in HFC-CATV Network
Lee Su Yeon , Jeong Jin Ug
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 611-616, Oct. 2003
10.3745/KIPSTC.2003.10.5.611

Distributed Power Control with Reference Model in the CDMA cellular system
Lee Mu Yeong , O Do Chang , Kwon U Hyeon
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 617-624, Oct. 2003
10.3745/KIPSTC.2003.10.5.617

Fast Join Mechanism that considers the switching of the tree in Overlay Multicast
Jo Seong Yeon , No Gyeong Taeg , Park Myeong Sun
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 625-634, Oct. 2003
10.3745/KIPSTC.2003.10.5.625

A Study of Efficient Spare Capacity Planning Scheme in Mesh-Based Survivable Fiber-Optic Networks
Bang Hyeong Bin , Kim Byeong Gi
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 635-640, Oct. 2003
10.3745/KIPSTC.2003.10.5.635

A Partitioned Compressed-Trie for Speeding up IP Address Lookups
Park Jae Hyeong , Jang Ig Hyeon , Jeong Min Yeong , Won Yong Gwan
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 641-646, Oct. 2003
10.3745/KIPSTC.2003.10.5.641

Dynamic Link Recommendation Based on Anonymous Weblog Mining
Yun Seon Hui , O Hae Seog
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 647-656, Oct. 2003
10.3745/KIPSTC.2003.10.5.647