Digital Library
Search: "[ keyword: ICA ]" (308)
-
Joong-Jin Kook, Jae-Hoon Ahn, Ji-Man Hong, Vol. 10, No. 3, pp. 61-70, Jun. 2009
Keywords: Sensor network, hierarchical routing, low power routing -
Nguyen Thi Thanh Huyen, Eui-Nam Huh, Vol. 10, No. 3, pp. 51-60, Jun. 2009
Keywords: reliable 2-mode authentication, probabilistic key pre-distribution, Wireless Sensor Network, trust, cluster -
123. Threat Unification using Multi-Sensor Simulator of Battlefield Helicopter and Its ImplementationHun-Woo Park, Shin-Bong Kang, Sang-Uk Noh, Un-Seob Jeong, Vol. 10, No. 3, pp. 35-50, Jun. 2009
Keywords: intelligent agent, decision-making, threat unification, threat simulator -
Huhn-Kuk Lim, Vol. 10, No. 2, pp. 171-178, Apr. 2009
Keywords: Optical packet switch, hybrid buffer, Scheduling Algorithm, Tunable wavelength converter, internal wavelength FDL buffer, electronic buffer -
Dong-Bum Lee, Woong Go, Jin Kwak, Vol. 10, No. 2, pp. 53-64, Apr. 2009
Keywords: e-Passport, authentication, Key agreement protocol, Inspection system -
Sin-Sook Yoon, Jae-Cheol Ha, Vol. 10, No. 2, pp. 41-52, Apr. 2009
Keywords: authentication, key agreement, WSN -
127. Intelligent Multi-Agent Distributed Platform based on Dynamic Object Group Management using Fk-meansJae-wan Lee, Hye-Young Na, Romeo Mark A. Mateo, Vol. 10, No. 1, pp. 101-110, Feb. 2009
Keywords: Multi-agent system, distributed object group, clustering, object replication -
Hyung-Jin Lim, Jeong-Gun Lee, Moon-Seong Kim, Vol. 9, No. 6, pp. 73-80, Dec. 2008
Keywords: Secure Internet banking, One time password, Transaction verification -
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho, Vol. 9, No. 6, pp. 63-72, Dec. 2008
Keywords: Ubiquitous Environment, Heterogeneous Network Security, Secure Network Management, User Authentication -
Hyung-Jong Kim, Vol. 9, No. 6, pp. 49-62, Dec. 2008
Keywords: Meaning-based Vulnerability Identification, Vulnerability Assessment, Atomic vulnerability, Vulnerability Description Analysis