Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, Feb. 2006


A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment
Dae Hee Seo , Im Yeong Lee
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 1-10, Feb. 2006
10.3745/KIPSTC.2006.13.1.1

Design an Algorithm Matching TCP Connection Pairs for Intruder Traceback
Hyung Woo Kang , Soon Jwa Hong , Dong Hoon Lee
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 11-18, Feb. 2006
10.3745/KIPSTC.2006.13.1.11

Profile based Web Application Attack Detection and Filtering Method
Young Tae Yun , Jae Cheol Ryou , Sang Seo Park , Jong Wook Park
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 19-26, Feb. 2006
10.3745/KIPSTC.2006.13.1.19

A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini
Jong Phil Yang , Kyung Hyune Rhee
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 27-34, Feb. 2006
10.3745/KIPSTC.2006.13.1.27

Design & Implementation of DRM System for End-to-end Content Protection
Yeon Jeong Jeong , Ki Song Yoon
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 35-44, Feb. 2006
10.3745/KIPSTC.2006.13.1.35

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs
Sung Suk Kim , Jun Ho Choi , Young Geon Bae , Pan Koo Kim
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 45-54, Feb. 2006
10.3745/KIPSTC.2006.13.1.45

Design and Implementation of a Keyboard Input Security System for Safe and Trusted E-Commerce
Sung Wook Choi , Ki Tae Kim
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 55-62, Feb. 2006
10.3745/KIPSTC.2006.13.1.55

A Study on cost damage of Cyber Attacks and their Impact on Stock Market
Il Seok Oh , Seok Yun Lee
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 63-68, Feb. 2006
10.3745/KIPSTC.2006.13.1.63

A Comparative Study on Information Security Management Activity of Public Sector in USA & Korea
So Jeong Kim
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 69-74, Feb. 2006
10.3745/KIPSTC.2006.13.1.69

A Half-Rate Space-Frequency Coded OFDM with Dual Viterbi Decoder
Seog Geun Kang
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 75-82, Feb. 2006
10.3745/KIPSTC.2006.13.1.75

ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer
Sung Yeal Im , Ki Dong Chung
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 83-94, Feb. 2006
10.3745/KIPSTC.2006.13.1.83

A Low-Cost Portable Precise Position Information Service System Using the DGPS Mechanism
Hyo Bum Yeoun , Yeong Wook Kang , Ki Dong Lee
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 95-102, Feb. 2006
10.3745/KIPSTC.2006.13.1.95

Energy Efficient Two-Tier Routing Protocol for Wireless Sensor Networks
Eun Chul Ahn , Sung Hyup Lee , You Ze Cho
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 103-112, Feb. 2006
10.3745/KIPSTC.2006.13.1.103

A Fast Authentication Method using Hash Value for Realtime Communication in Mobile IPv6 network
Hyung Mo Kang , Young Song Mun
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 113-120, Feb. 2006
10.3745/KIPSTC.2006.13.1.113

Enhancement of FMIPv6 using Tentative and Early Binding Update to Home Agent
Seong Geun Ryu , Young Song Mun
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 121-128, Feb. 2006
10.3745/KIPSTC.2006.13.1.121

Semantic Web based Information Retrieval System for the automatic integration framework
Ok Kyung Choi , Sang Yong Han
KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 129-136, Feb. 2006
10.3745/KIPSTC.2006.13.1.129