Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, Dec. 2008


Design and Implementation of Method of Authentication and Cryptography between EPC Systems
Dae Jung Kim , Jung Jae Kim , Seung Min Lee , Moon Seog Jun
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 439-446, Dec. 2008
10.3745/KIPSTC.2008.15.6.439

An OTP(One Time Password) Key Generation Method and Simulation using Homomorphic Graph by the Fingerprint Features
Byung Rae Cha
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 447-454, Dec. 2008
10.3745/KIPSTC.2008.15.6.447

RBAC-based Trust Negotiation Model for Grid Security
Hyun Sug Cho , Bong Hwan Lee
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 455-468, Dec. 2008
10.3745/KIPSTC.2008.15.6.455

A New Dynamic-ID based REIF Mutual Authentication Protocol Eliminated Synchronization Problem
Ji Hwan Lim , Hee Kuck Oh , Sang Jin Kim
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 469-480, Dec. 2008
10.3745/KIPSTC.2008.15.6.469

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment
Jong Sik Moon , Im Yeong Lee
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 481-492, Dec. 2008
10.3745/KIPSTC.2008.15.6.481

Context-based Dynamic Access Control Model for u-healthcare and its Application
Chang Won Jeong , Dong Ho Kim , Su Chong Joo
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 493-506, Dec. 2008
10.3745/KIPSTC.2008.15.6.493

Design of High Speed Modular Exponentiation Operation Method for RSA Algorithm
Kap Yol Kim , Chul Soo Lee , Seok Cheon Park
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 507-512, Dec. 2008
10.3745/KIPSTC.2008.15.6.507

An Proxy Trajectory Based Storage in Sensor Networks
Hwa Jung Lim , Heon Guil Lee
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 513-522, Dec. 2008
10.3745/KIPSTC.2008.15.6.513

Queuing Analysis Model for the SR-ARQ Protocol with a Finite Retransmission Persistence
Je Chan Han , Beom Joon Kim , Jai Yong Lee
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 523-530, Dec. 2008
10.3745/KIPSTC.2008.15.6.523

A Study of Routing based on Adjacency Matrix in Ad hoc Networks
Sung Soo Lee , Jeong Mi Kim , Hee Joo Park , Chong Gun Kim
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 531-538, Dec. 2008
10.3745/KIPSTC.2008.15.6.531

Address Configuration and Route Determination in the MANET Connected to the External Network
Jae Hwoon Lee , Sang Hyun Ahn , Hyun Yu
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 539-546, Dec. 2008
10.3745/KIPSTC.2008.15.6.539

Network Adaptive Prefetching for Constant QoS Guarantee in Media Streaming
Joa Hyoung Lee , In Bum Jung
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 547-556, Dec. 2008
10.3745/KIPSTC.2008.15.6.547

Overlay Multicast Mechanism Supporting Differentiated QoS According to Service Level and User Environment over NGN
Bo Young Rhee , Sung Choi Cho , Sun Young Han
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 557-566, Dec. 2008
10.3745/KIPSTC.2008.15.6.557

Encapsulation of IP Traffic through GFP in OTN Transmission Network
Chang Ki Lee , Choong Reol Yang
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 567-572, Dec. 2008
10.3745/KIPSTC.2008.15.6.567

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key
Ho Seok Kang , Young Chul Shim
KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, pp. 573-586, Dec. 2008
10.3745/KIPSTC.2008.15.6.573