Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, Jun. 2012


User Authentication Method using Vibration Cue on Smartphone
Jong Hyeok Lee , Ok Kyung Choi , Kang Seok Kim , Hong Jin Yeh
KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 167-172, Jun. 2012
10.3745/KIPSTC.2012.19.3.167

On Message Length Efficiency of Two Security Schemes using Bloom Filter
Young Jae Maeng , Jeon Il Kang , Dae Hun Nyang , Kyung Hee Lee
KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 173-178, Jun. 2012
10.3745/KIPSTC.2012.19.3.173

Side-channel Attack on the Final Round SHA-3 Candidate Skein
Ae Sun Park , Jong Yeon Park , Dong Guk Han , Ok Yeon Yi
KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 179-184, Jun. 2012
10.3745/KIPSTC.2012.19.3.179

A Study on the Malicious Web Page Detection Systems using Real-Time Behavior Analysis
I Cksun Kong , Jae Ik Cho , Tae Shik Son , Jong Sub Moon
KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 185-190, Jun. 2012
10.3745/KIPSTC.2012.19.3.185

Cost-Effective Inter-LMA Domain Distributed
Soon Ho Jang , Jong Pil Jeong
KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 191-208, Jun. 2012
10.3745/KIPSTC.2012.19.3.191

Time Synchronization by Consecutive Broadcast for Wireless Sensor Networks
Shi Kyu Bae
KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 209-214, Jun. 2012
10.3745/KIPSTC.2012.19.3.209