Digital Library
Search: "[ keyword: 보안 ]" (196)
Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK
Song Gyeong Ju, Jang Kyung Bae, Sim Min Joo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 181-188,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.181
Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength
https://doi.org/10.3745/KTCCS.2023.12.6.181
Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength
A Study on the Activation of Sharing Cyber-ThreatInformation among Businesses
Seokeon Choe, Jongsub Lee, Geunsun Tak, Joowon Choi KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 4, pp. 143-156,
Apr.
2023
https://doi.org/10.3745/KTCCS.2023.12.4.143
Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model
https://doi.org/10.3745/KTCCS.2023.12.4.143
Keywords: Cyber Security, CERT, Enterprise Information Security, Perceived Value, Value Based Adoption Model
A Study on Application Methodology of SPDL Based onIEC 62443 Applicable to SME Environment
Jin Jung Ha, SangSeon Park, Kim Jun Tae, Keunhee Han KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 6, pp. 193-204,
Jun.
2022
https://doi.org/10.3745/KTCCS.2022.11.6.193
Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)
https://doi.org/10.3745/KTCCS.2022.11.6.193
Keywords: Small and Medium-sized Enterprise(SME) environment, Cyber Security, industrial control system(ICS), IEC 62443, SecureProduct Development Lifecycle(SPDL)
Development of Embedded Security Fax Server Supporting Dual Mode
Sang Hak Lee , Tae Choong Chung The KIPS Transactions:PartA,
Vol. 11, No. 3, pp. 129-138,
Jun.
2004
10.3745/KIPSTA.2004.11.3.129
10.3745/KIPSTA.2004.11.3.129
A Study on Secure Encoding for Visible Light Communication Without Performance Degradation
Minchul Kim, Taeweon Suh KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 1, pp. 35-42,
Jan.
2022
https://doi.org/10.3745/KTCCS.2022.11.1.35
Keywords: Visible light communication, Secure Encoding, secure communication, On-Off Keying, VPPM
https://doi.org/10.3745/KTCCS.2022.11.1.35
Keywords: Visible light communication, Secure Encoding, secure communication, On-Off Keying, VPPM
Implementation of Kiosk-based Internet Public Services System
An Im Sang , Jeong Gi Won The KIPS Transactions:PartA,
Vol. 10, No. 5, pp. 433-438,
Oct.
2003
10.3745/KIPSTA.2003.10.5.433
10.3745/KIPSTA.2003.10.5.433
Derivation of Security Requirements for Cloud Managing SecurityServices System by Threat Modeling Analysis
Jang Hwan KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 5, pp. 145-154,
May.
2021
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements
Design of a Lightweight Security Protocol Using Post Quantum Cryptography
Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 8, pp. 165-170,
Aug.
2020
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO
A Study on Layered Weight Based Vulnerability Impact Assessment Scoring System
Youngjong Kim KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 7, pp. 177-180,
Jul.
2019
https://doi.org/10.3745/KTCCS.2019.8.7.177
Keywords: CVE, CVSS, Vulnerability Impact Assessment Scoring System
https://doi.org/10.3745/KTCCS.2019.8.7.177
Keywords: CVE, CVSS, Vulnerability Impact Assessment Scoring System
The Blocking of buffer overflow based attack for Linux kernel
Jeong Nyeo Kim, Kyo Il Chung, Cheol Hoon Lee The KIPS Transactions:PartA,
Vol. 8, No. 4, pp. 385-390,
Dec.
2001
10.3745/KIPSTA.2001.8.4.385
10.3745/KIPSTA.2001.8.4.385