Digital Library


Search: "[ keyword: 보안 ]" (196)
    Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK
    Song Gyeong Ju, Jang Kyung Bae, Sim Min Joo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 6, pp. 181-188, Jun. 2023
    https://doi.org/10.3745/KTCCS.2023.12.6.181  
    Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength

    A Study on the Activation of Sharing Cyber-ThreatInformation among Businesses
    Seokeon Choe, Jongsub Lee, Geunsun Tak, Joowon Choi KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 4, pp. 143-156, Apr. 2023
    https://doi.org/10.3745/KTCCS.2023.12.4.143
    Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model

    A Study on Application Methodology of SPDL Based onIEC 62443 Applicable to SME Environment
    Jin Jung Ha, SangSeon Park, Kim Jun Tae, Keunhee Han KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 6, pp. 193-204, Jun. 2022
    https://doi.org/10.3745/KTCCS.2022.11.6.193
    Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)

    Development of Embedded Security Fax Server Supporting Dual Mode
    Sang Hak Lee , Tae Choong Chung The KIPS Transactions:PartA, Vol. 11, No. 3, pp. 129-138, Jun. 2004
    10.3745/KIPSTA.2004.11.3.129

    A Study on Secure Encoding for Visible Light Communication Without Performance Degradation
    Minchul Kim, Taeweon Suh KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 1, pp. 35-42, Jan. 2022
    https://doi.org/10.3745/KTCCS.2022.11.1.35
    Keywords: Visible light communication, Secure Encoding, secure communication, On-Off Keying, VPPM

    Implementation of Kiosk-based Internet Public Services System
    An Im Sang , Jeong Gi Won The KIPS Transactions:PartA, Vol. 10, No. 5, pp. 433-438, Oct. 2003
    10.3745/KIPSTA.2003.10.5.433

    Derivation of Security Requirements for Cloud Managing SecurityServices System by Threat Modeling Analysis
    Jang Hwan KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 145-154, May. 2021
    https://doi.org/10.3745/KTCCS.2021.10.5.145
    Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements

    Design of a Lightweight Security Protocol Using Post Quantum Cryptography
    Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 8, pp. 165-170, Aug. 2020
    https://doi.org/10.3745/KTCCS.2020.9.8.165  
    Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO

    A Study on Layered Weight Based Vulnerability Impact Assessment Scoring System
    Youngjong Kim KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 7, pp. 177-180, Jul. 2019
    https://doi.org/10.3745/KTCCS.2019.8.7.177
    Keywords: CVE, CVSS, Vulnerability Impact Assessment Scoring System

    The Blocking of buffer overflow based attack for Linux kernel
    Jeong Nyeo Kim, Kyo Il Chung, Cheol Hoon Lee The KIPS Transactions:PartA, Vol. 8, No. 4, pp. 385-390, Dec. 2001
    10.3745/KIPSTA.2001.8.4.385