Digital Library
Search: "[ keyword: 보안 ]" (48)
-
Dusung Back, Kihyun Pyun, Vol. 15, No. 5, pp. 133-0, Oct. 2014
10.7472/jksii.2014.15.5.133
Keywords: kernel function hooking, system protection -
Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
10.7472/jksii.2014.15.3.91
Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment -
Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
10.7472/jksii.2014.15.2.129
Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument -
Adila Firdaus Arbain, Imran Ghani, Seung Ryul Jeong, Vol. 15, No. 1, pp. 13-28, Feb. 2014
10.7472/jksii.2014.15.1.13
Keywords: Agile Methodology, Security, software engineering, Feature Driven Development -
Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
10.7472/jksii.2013.14.4.35
Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE -
Yunho Lee, Vol. 14, No. 3, pp. 15-22, Jun. 2013
10.7472/jksii.2013.14.3.15
Keywords: Mobile Security, Secure Keypads, Personal Information, Keylogger -
Daeyoung Heo, Suntae Hwang, Vol. 13, No. 6, pp. 55-62, Dec. 2012
10.7472/jksii.2012.13.6.55
Keywords: X.509 Proxy Delegation, Grid Security, OAuth -
Young Bae Yoon, Junseok Oh, Bong Gyou Lee, Vol. 13, No. 6, pp. 33-40, Dec. 2012
10.7472/jksii.2012.13.6.33
Keywords: Cloud Services, Security Importance, Ordered Logit Model -
Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
10.7472/jksii.2012.13.2.59
Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing -
Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
10.7472/jksii.2012.13.2.51
Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments