Digital Library
Search: "[ keyword: Security ]" (204)
A Visualization System for Permission Check in Java using Static Analysis
Yun Kyung Kim , Byeong Mo Chang The KIPS Transactions:PartA,
Vol. 13, No. 5, pp. 399-404,
Oct.
2006
10.3745/KIPSTA.2006.13.5.399

A Share Hardening Method for Multi-Factor Secret Sharing
Sung Wook Chung, Min Soo Ryu KIPS Transactions on Computer and Communication Systems,
Vol. 13, No. 1, pp. 31-37,
Jan.
2024
https://doi.org/10.3745/KTCCS.2024.13.1.31
Keywords: Security, Secret Sharing, Share, Hardening

Keywords: Security, Secret Sharing, Share, Hardening
N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication
Tae-Young Eun, Alshihri Saad, Soo-Yong Park KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 197-208,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.197
Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security

Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security
A Study on How to Build a Zero Trust Security Model
Jin Yong Lee, Byoung Hoon Choi, Namhyun Koh, Samhyun Chun KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 189-196,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.189
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust

Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust
Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK
Song Gyeong Ju, Jang Kyung Bae, Sim Min Joo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 181-188,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.181
Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength

Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength
A Study on the Activation of Sharing Cyber-ThreatInformation among Businesses
Seokeon Choe, Jongsub Lee, Geunsun Tak, Joowon Choi KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 4, pp. 143-156,
Apr.
2023
https://doi.org/10.3745/KTCCS.2023.12.4.143
Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model

Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model
Requirements Analysis for Access Control Model on Ubiquitous Computing Environment
Se Jong Oh , Je Ho Park The KIPS Transactions:PartA,
Vol. 11, No. 7, pp. 563-570,
Dec.
2004
10.3745/KIPSTA.2004.11.7.563

A Study on Application Methodology of SPDL Based onIEC 62443 Applicable to SME Environment
Jin Jung Ha, SangSeon Park, Kim Jun Tae, Keunhee Han KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 6, pp. 193-204,
Jun.
2022
https://doi.org/10.3745/KTCCS.2022.11.6.193
Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)

Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)
Development of Embedded Security Fax Server Supporting Dual Mode
Sang Hak Lee , Tae Choong Chung The KIPS Transactions:PartA,
Vol. 11, No. 3, pp. 129-138,
Jun.
2004
10.3745/KIPSTA.2004.11.3.129

Derivation of Security Requirements for Cloud Managing SecurityServices System by Threat Modeling Analysis
Jang Hwan KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 5, pp. 145-154,
May.
2021
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements

Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements