Digital Library
Search: "[ keyword: Security ]" (204)
Security Analysis on Password Authentication System of Web Sites
Hee Kyeong Noh , Chang Kuk Choi , Min Su Park , Seung Joo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 12, pp. 463-478,
Dec.
2014
10.3745/KTCCS.2014.3.12.463

A Study for Task Detection Acquiring Abnormal Permission in Linux
Won Il Kim , Sang Hyun Yoo , Ju Hyun Kwak , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 11, pp. 427-432,
Nov.
2014
10.3745/KTCCS.2014.3.11.427

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment
Jeong Hyo Park , Kim Nak Hyun , Yong Hoon Jung , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 10, pp. 323-328,
Oct.
2014
10.3745/KTCCS.2014.3.10.323

The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance
Jeong Kuk Park , In Jai Kim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 9, pp. 301-310,
Sep.
2014
10.3745/KTCCS.2014.3.9.301

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 8, pp. 271-276,
Aug.
2014
10.3745/KTCCS.2014.3.8.271

An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems
Hyung Chan Kim , Il Hwan Park KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 2, pp. 31-42,
Feb.
2014
10.3745/KTCCS.2014.3.2.31

A Study on the SmartPhone GPS based Graphical Password Approach
Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 525-532,
Dec.
2013
10.3745/KTCCS.2013.2.12.525

Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 561-568,
Dec.
2013
10.3745/KTCCS.2013.2.12.561

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
Myong Hee Kim , Wildan Toyib KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 541-552,
Dec.
2013
10.3745/KTCCS.2013.2.12.541

A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
Hur Hwan Seok , Kang Sung Hoon , Kim Seung Joo KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 10, pp. 445-460,
Oct.
2013
10.3745/KTCCS.2013.2.10.445
