Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 2, Feb. 2018


A Monitoring Scheme Based on Artificial Intelligence in Mobile Edge Cloud Computing Environments
JongBeom Lim, HeeSeok Choi, HeonChang Yu
KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 2, pp. 27-32, Feb. 2018
10.3745/KTCCS.2018.7.2.27
Keywords: Mobile Edge Cloud, Monitoring, Artificial Intelligence, Fault Tolerance

Performance Enhancement Method Through Science DMZ Data Transfer Node Tuning Parameters
Park Jong Seon, Park Jin Hyung, Kim Seung Hae, Noh Min Ki
KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 2, pp. 33-40, Feb. 2018
10.3745/KTCCS.2018.7.2.33
Keywords: End to End Transfer Efficiency, 100Gbps Data Transfer Node, Tuning Parameters

Password-Based Mutual Authentication Protocol Against Phishing Attacks
Iksu Kim, Jongmyung Choi
KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 2, pp. 41-48, Feb. 2018
10.3745/KTCCS.2018.7.2.41
Keywords: Phishing, Authentication Protocol, MITM Attack, Replay Attack

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP
Sung-Hwan Jo, Gi-Tae Han
KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 2, pp. 49-58, Feb. 2018
10.3745/KTCCS.2018.7.2.49
Keywords: Certification, Multi Channel Authentication, Digital Signature, Smart Device

Permission Management System for Secure IoT Devices in Android-Based IoT Environment
In Kyu Park, Jin Kwak
KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 2, pp. 59-66, Feb. 2018
10.3745/KTCCS.2018.7.2.59