Digital Library
Search: "[ keyword: 보안 ]" (196)
Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats
Tae Young Lee , Dong Gue Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 8, pp. 357-368,
Aug.
2013
10.3745/KTCCS.2013.2.8.357
10.3745/KTCCS.2013.2.8.357
Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs
Hyun Il Lim KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 7, pp. 303-310,
Jul.
2013
10.3745/KTCCS.2013.2.7.303
10.3745/KTCCS.2013.2.7.303
Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks
Soohyun Park , Sunil Kim KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 5, pp. 217-222,
May.
2013
10.3745/KTCCS.2013.2.5.217
10.3745/KTCCS.2013.2.5.217
An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks
Lee Jae Sik , Kim Sung Chun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 4, pp. 156-163,
Apr.
2013
10.3745/KTCCS.2013.2.4.156
10.3745/KTCCS.2013.2.4.156
Reducing of Authentication Signaling Traffic in LTE Networks
Seonho Kim , Jongpil Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 1, No. 2, pp. 109-118,
Nov.
2012
10.3745/KTCCS.2012.1.2.109
10.3745/KTCCS.2012.1.2.109
An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit
Seong Yong Joo , Joon Seon Ahn , Jang Wu Jo The KIPS Transactions:PartA,
Vol. 15, No. 1, pp. 45-52,
Feb.
2008
10.3745/KIPSTA.2008.15.1.45
10.3745/KIPSTA.2008.15.1.45
A Visualization System for Permission Check in Java using Static Analysis
Yun Kyung Kim , Byeong Mo Chang The KIPS Transactions:PartA,
Vol. 13, No. 5, pp. 399-404,
Oct.
2006
10.3745/KIPSTA.2006.13.5.399
10.3745/KIPSTA.2006.13.5.399
A Share Hardening Method for Multi-Factor Secret Sharing
Sung Wook Chung, Min Soo Ryu KIPS Transactions on Computer and Communication Systems,
Vol. 13, No. 1, pp. 31-37,
Jan.
2024
https://doi.org/10.3745/KTCCS.2024.13.1.31
Keywords: Security, Secret Sharing, Share, Hardening
https://doi.org/10.3745/KTCCS.2024.13.1.31
Keywords: Security, Secret Sharing, Share, Hardening
N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication
Tae-Young Eun, Alshihri Saad, Soo-Yong Park KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 197-208,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.197
Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security
https://doi.org/10.3745/KTCCS.2023.12.6.197
Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security
A Study on How to Build a Zero Trust Security Model
Jin Yong Lee, Byoung Hoon Choi, Namhyun Koh, Samhyun Chun KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 189-196,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.189
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust
https://doi.org/10.3745/KTCCS.2023.12.6.189
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust