Digital Library
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, Jun. 2019
Wall Cuckoo: A Method for Reducing Memory Access Using Hash Function Categorization
Seong-kwang Moon, Dae-hong Min, Rhong-ho Jang, Chang-hun Jung, Dae-hun Nyang, Kyung-hee Lee
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 127-138, Jun. 2019
https://doi.org/10.3745/KTCCS.2019.8.6.127
Keywords: Open Addressing, Hash Table, Cuckoo Hashing, Key-Value Store, In-Memory Cache
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 127-138, Jun. 2019
https://doi.org/10.3745/KTCCS.2019.8.6.127
Keywords: Open Addressing, Hash Table, Cuckoo Hashing, Key-Value Store, In-Memory Cache
IoT Multi-Phase Authentication System Using Token Based Blockchain
Hwan Park, Mi-sun Kim, Jae-hyun Seo
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 139-150, Jun. 2019
https://doi.org/10.3745/KTCCS.2019.8.6.139
Keywords: IoT, Mutual Authentication, Protocol, Blockchain, Token
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 139-150, Jun. 2019
https://doi.org/10.3745/KTCCS.2019.8.6.139
Keywords: IoT, Mutual Authentication, Protocol, Blockchain, Token
Real-Time Detection on FLUSH+RELOAD Attack Using Performance Counter Monitor
Jonghyeon Cho, Taehyun Kim, Youngjoo Shin
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 151-158, Jun. 2019
https://doi.org/10.3745/KTCCS.2019.8.6.151
Keywords: Cache-Side Channel Attack, FLUSH+RELOAD Attack, Performance Counter Monitor, Attack Detection
KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 151-158, Jun. 2019
https://doi.org/10.3745/KTCCS.2019.8.6.151
Keywords: Cache-Side Channel Attack, FLUSH+RELOAD Attack, Performance Counter Monitor, Attack Detection