Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, Oct. 2003


Development of a Linux Kernel-Thread Secure Socket Layer (SSL) WEB Accelerator
Nam Ui Seog , Min Byeong Jo , Kim Hag Bae
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 657-664, Oct. 2003
10.3745/KIPSTC.2003.10.6.657

Alert Correlation Analysis based on Clustering Technique for IDS
Sin Mun Seon , Mun Ho Seong , Lyu Geun Ho , Jang Jong Su
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 665-674, Oct. 2003
10.3745/KIPSTC.2003.10.6.665

Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication
Kim Ig Su , Kim Myeong Ho
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 675-682, Oct. 2003
10.3745/KIPSTC.2003.10.6.675

An Efficient Change Detection Algorithm for Tree-structured Data
Lee Seog Gyun , Kim Dong A
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 683-694, Oct. 2003
10.3745/KIPSTC.2003.10.6.683

Design and Implementation of Mobile Security System for Digital contents Rights Protection in Wireless Internet Environment
Kim Hu Jong , Na Seung Won
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 695-704, Oct. 2003
10.3745/KIPSTC.2003.10.6.695

Hybrid Statistical Learning Model for Intrusion Detection of Networks
Jeon Seong Hae
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 705-710, Oct. 2003
10.3745/KIPSTC.2003.10.6.705

An Internet Time Synchronization Model using Dynamic Linear Model
Yu Dong Hui , Hwang So Yeong , Kim Yong Ho
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 711-716, Oct. 2003
10.3745/KIPSTC.2003.10.6.711

Design and Implementation of the Intrusion Detection Pattern Algorithm Based on Data Mining
Lee Sang Hun , So Jin
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 717-726, Oct. 2003
10.3745/KIPSTC.2003.10.6.717

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System
Jang Jeong Sug , Jeon Yong Hui , Jang Jong Su , Son Seung Won
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 727-738, Oct. 2003
10.3745/KIPSTC.2003.10.6.727

Design of Privilege Delegation Mechanism using Proxy Certificate
Jin Seung Heon , Jo Sang Lae , Kim Tae Seong , Lyu Jae Cheol
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 739-746, Oct. 2003
10.3745/KIPSTC.2003.10.6.739

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card
Seong Sun Hwa , Gong Eun Bae
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 747-754, Oct. 2003
10.3745/KIPSTC.2003.10.6.747

Comparison and Analysis of Protocols for the Secure Binding Updates in MIPv6
Won Yu Seog , Jo Gyeong San
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 755-762, Oct. 2003
10.3745/KIPSTC.2003.10.6.755

A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography
Yu Il Seon , Jo Gyeong San
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 763-768, Oct. 2003
10.3745/KIPSTC.2003.10.6.763

A Study on Key Information Service Protocol for Secure XML Web Service
Park Nam Je , Mun Gi Yeong , Son Seung Won
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 769-778, Oct. 2003
10.3745/KIPSTC.2003.10.6.769

A Correction Security Framework for Reliable Internet Services
Lee Seung Min , Nam Taeg Yong , Son Seung Won , Han Chi Mun
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 779-786, Oct. 2003
10.3745/KIPSTC.2003.10.6.779

Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment
Choe Gil Hwan , Sin Min Hwa , Bae Sang Hyeon
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 787-792, Oct. 2003
10.3745/KIPSTC.2003.10.6.787

An Access Control using SPKI Certificate in Peer-to-Peer Environment
Sin Jeong Hwa , Lee Yeong Gyeong , Lee Gyeong Hyeon
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 793-798, Oct. 2003
10.3745/KIPSTC.2003.10.6.793

A Study on Survivability of Node using Response Mechanism in Active Network Environment
Yang Jin Seog , Lee Ho Jae , Jang Beom Hwan , Kim Hyeon Gu , Han Yeong Ju , Jeong Tae Myeong
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 799-808, Oct. 2003
10.3745/KIPSTC.2003.10.6.799

A Group Key Management for Real-Time Multicasting Information Security
Hong Jong Jun , Hwang Gyo Cheol
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 809-814, Oct. 2003
10.3745/KIPSTC.2003.10.6.809

A Preventive and Risk-reducing Integrated Security Management Model using Security Label
Kim Dong Su , Kim Tae Gyeong , Jeong Tae Myeong
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 815-824, Oct. 2003
10.3745/KIPSTC.2003.10.6.815

Distributed Secure Mail System For Roaming User
Yang Jong Pil , Seo Cheol , Lee Gyeong Hyeon
KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 6, pp. 825-834, Oct. 2003
10.3745/KIPSTC.2003.10.6.825