Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 6, Dec. 2008


Design and Implementation of Method of Authentication and Cryptography between EPC Systems
Dae Jung Kim , Jung Jae Kim , Seung Min Lee , Moon Seog Jun
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 439-446, Dec. 2008
10.3745/KIPSTC.2008.15.6.439

An OTP(One Time Password) Key Generation Method and Simulation using Homomorphic Graph by the Fingerprint Features
Byung Rae Cha
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 447-454, Dec. 2008
10.3745/KIPSTC.2008.15.6.447

RBAC-based Trust Negotiation Model for Grid Security
Hyun Sug Cho , Bong Hwan Lee
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 455-468, Dec. 2008
10.3745/KIPSTC.2008.15.6.455

A New Dynamic-ID based REIF Mutual Authentication Protocol Eliminated Synchronization Problem
Ji Hwan Lim , Hee Kuck Oh , Sang Jin Kim
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 469-480, Dec. 2008
10.3745/KIPSTC.2008.15.6.469

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment
Jong Sik Moon , Im Yeong Lee
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 481-492, Dec. 2008
10.3745/KIPSTC.2008.15.6.481

Context-based Dynamic Access Control Model for u-healthcare and its Application
Chang Won Jeong , Dong Ho Kim , Su Chong Joo
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 493-506, Dec. 2008
10.3745/KIPSTC.2008.15.6.493

Design of High Speed Modular Exponentiation Operation Method for RSA Algorithm
Kap Yol Kim , Chul Soo Lee , Seok Cheon Park
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 507-512, Dec. 2008
10.3745/KIPSTC.2008.15.6.507

An Proxy Trajectory Based Storage in Sensor Networks
Hwa Jung Lim , Heon Guil Lee
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 513-522, Dec. 2008
10.3745/KIPSTC.2008.15.6.513

Queuing Analysis Model for the SR-ARQ Protocol with a Finite Retransmission Persistence
Je Chan Han , Beom Joon Kim , Jai Yong Lee
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 523-530, Dec. 2008
10.3745/KIPSTC.2008.15.6.523

A Study of Routing based on Adjacency Matrix in Ad hoc Networks
Sung Soo Lee , Jeong Mi Kim , Hee Joo Park , Chong Gun Kim
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 531-538, Dec. 2008
10.3745/KIPSTC.2008.15.6.531

Address Configuration and Route Determination in the MANET Connected to the External Network
Jae Hwoon Lee , Sang Hyun Ahn , Hyun Yu
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 539-546, Dec. 2008
10.3745/KIPSTC.2008.15.6.539

Network Adaptive Prefetching for Constant QoS Guarantee in Media Streaming
Joa Hyoung Lee , In Bum Jung
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 547-556, Dec. 2008
10.3745/KIPSTC.2008.15.6.547

Overlay Multicast Mechanism Supporting Differentiated QoS According to Service Level and User Environment over NGN
Bo Young Rhee , Sung Choi Cho , Sun Young Han
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 557-566, Dec. 2008
10.3745/KIPSTC.2008.15.6.557

Encapsulation of IP Traffic through GFP in OTN Transmission Network
Chang Ki Lee , Choong Reol Yang
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 567-572, Dec. 2008
10.3745/KIPSTC.2008.15.6.567

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key
Ho Seok Kang , Young Chul Shim
The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 573-586, Dec. 2008
10.3745/KIPSTC.2008.15.6.573