Digital Library
Search: "[ keyword: 보안 ]" (196)
Security Analysis on Password Authentication System of Web Sites
Hee Kyeong Noh , Chang Kuk Choi , Min Su Park , Seung Joo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 12, pp. 463-478,
Dec.
2014
10.3745/KTCCS.2014.3.12.463
10.3745/KTCCS.2014.3.12.463
A Study for Task Detection Acquiring Abnormal Permission in Linux
Won Il Kim , Sang Hyun Yoo , Ju Hyun Kwak , Chang Hoon Lee KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 11, pp. 427-432,
Nov.
2014
10.3745/KTCCS.2014.3.11.427
10.3745/KTCCS.2014.3.11.427
A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment
Jeong Hyo Park , Kim Nak Hyun , Yong Hoon Jung , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 10, pp. 323-328,
Oct.
2014
10.3745/KTCCS.2014.3.10.323
10.3745/KTCCS.2014.3.10.323
An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification
Jun Ho Lee , Kyung Sang Sung , Hea Seok Oh KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 8, pp. 271-276,
Aug.
2014
10.3745/KTCCS.2014.3.8.271
10.3745/KTCCS.2014.3.8.271
Height Prediction Mechanism for Smart Surveillance Systems
Jae Seok Shim , Yu Jin Lim KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 7, pp. 241-244,
Jul.
2014
10.3745/KTCCS.2014.3.7.241
10.3745/KTCCS.2014.3.7.241
An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems
Hyung Chan Kim , Il Hwan Park KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 2, pp. 31-42,
Feb.
2014
10.3745/KTCCS.2014.3.2.31
10.3745/KTCCS.2014.3.2.31
A Study on the SmartPhone GPS based Graphical Password Approach
Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 525-532,
Dec.
2013
10.3745/KTCCS.2013.2.12.525
10.3745/KTCCS.2013.2.12.525
Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
Kwang Il Jeong , Joon Ku Lee , Geun Ok Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 561-568,
Dec.
2013
10.3745/KTCCS.2013.2.12.561
10.3745/KTCCS.2013.2.12.561
An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
Myong Hee Kim , Wildan Toyib KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 541-552,
Dec.
2013
10.3745/KTCCS.2013.2.12.541
10.3745/KTCCS.2013.2.12.541
A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
Hur Hwan Seok , Kang Sung Hoon , Kim Seung Joo KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 10, pp. 445-460,
Oct.
2013
10.3745/KTCCS.2013.2.10.445
10.3745/KTCCS.2013.2.10.445