Digital Library
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, Dec. 2013
A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme
Jeong Hyo Park , Yong Hoon Jung , Moon Seog Jun
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 511-516, Dec. 2013
10.3745/KTCCS.2013.2.12.511
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 511-516, Dec. 2013
10.3745/KTCCS.2013.2.12.511
Zero-knowledge Based User Remote Authentication Over Elliptic Curve
Jong Seok Choi , Ho Won Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 517-524, Dec. 2013
10.3745/KTCCS.2013.2.12.517
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 517-524, Dec. 2013
10.3745/KTCCS.2013.2.12.517
A Study on the SmartPhone GPS based Graphical Password Approach
Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 525-532, Dec. 2013
10.3745/KTCCS.2013.2.12.525
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 525-532, Dec. 2013
10.3745/KTCCS.2013.2.12.525
Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph
Kyungbaek Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 533-540, Dec. 2013
10.3745/KTCCS.2013.2.12.533
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 533-540, Dec. 2013
10.3745/KTCCS.2013.2.12.533
An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone
Myong Hee Kim , Wildan Toyib
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 541-552, Dec. 2013
10.3745/KTCCS.2013.2.12.541
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 541-552, Dec. 2013
10.3745/KTCCS.2013.2.12.541
Design and Implementation of DRM Proxy for DRM Cloud Service
Hyejoo Lee , Changsoo Heo , Changho Seo , Sang Uk Shin
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 553-560, Dec. 2013
10.3745/KTCCS.2013.2.12.553
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 553-560, Dec. 2013
10.3745/KTCCS.2013.2.12.553
Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack
Kwang Il Jeong , Joon Ku Lee , Geun Ok Park
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 561-568, Dec. 2013
10.3745/KTCCS.2013.2.12.561
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 561-568, Dec. 2013
10.3745/KTCCS.2013.2.12.561
A Study on Data Storage and Recovery in Hadoop Environment
Su Hyun Kim , Im Yeong Lee
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 569-576, Dec. 2013
10.3745/KTCCS.2013.2.12.569
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 569-576, Dec. 2013
10.3745/KTCCS.2013.2.12.569