Digital Library
Search: "[ keyword: Security ]" (200)
A Share Hardening Method for Multi-Factor Secret Sharing
Sung Wook Chung, Min Soo Ryu KIPS Transactions on Computer and Communication Systems,
Vol. 13, No. 1, pp. 31-37,
Jan.
2024
https://doi.org/10.3745/KTCCS.2024.13.1.31
Keywords: Security, Secret Sharing, Share, Hardening
https://doi.org/10.3745/KTCCS.2024.13.1.31
Keywords: Security, Secret Sharing, Share, Hardening
N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication
Tae-Young Eun, Alshihri Saad, Soo-Yong Park KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 197-208,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.197
Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security
https://doi.org/10.3745/KTCCS.2023.12.6.197
Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security
A Study on How to Build a Zero Trust Security Model
Jin Yong Lee, Byoung Hoon Choi, Namhyun Koh, Samhyun Chun KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 189-196,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.189
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust
https://doi.org/10.3745/KTCCS.2023.12.6.189
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust
Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK
Song Gyeong Ju, Jang Kyung Bae, Sim Min Joo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 181-188,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.181
Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength
https://doi.org/10.3745/KTCCS.2023.12.6.181
Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength
A Study on the Activation of Sharing Cyber-ThreatInformation among Businesses
Seokeon Choe, Jongsub Lee, Geunsun Tak, Joowon Choi KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 4, pp. 143-156,
Apr.
2023
https://doi.org/10.3745/KTCCS.2023.12.4.143
Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model
https://doi.org/10.3745/KTCCS.2023.12.4.143
Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model
Requirements Analysis for Access Control Model on Ubiquitous Computing Environment
Se Jong Oh , Je Ho Park The KIPS Transactions:PartA,
Vol. 11, No. 7, pp. 563-570,
Dec.
2004
10.3745/KIPSTA.2004.11.7.563
10.3745/KIPSTA.2004.11.7.563
A Study on Application Methodology of SPDL Based onIEC 62443 Applicable to SME Environment
Jin Jung Ha, SangSeon Park, Kim Jun Tae, Keunhee Han KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 6, pp. 193-204,
Jun.
2022
https://doi.org/10.3745/KTCCS.2022.11.6.193
Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)
https://doi.org/10.3745/KTCCS.2022.11.6.193
Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)
Development of Embedded Security Fax Server Supporting Dual Mode
Sang Hak Lee , Tae Choong Chung The KIPS Transactions:PartA,
Vol. 11, No. 3, pp. 129-138,
Jun.
2004
10.3745/KIPSTA.2004.11.3.129
10.3745/KIPSTA.2004.11.3.129
Derivation of Security Requirements for Cloud Managing SecurityServices System by Threat Modeling Analysis
Jang Hwan KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 5, pp. 145-154,
May.
2021
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements
Design of a Lightweight Security Protocol Using Post Quantum Cryptography
Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 8, pp. 165-170,
Aug.
2020
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO