• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Network Security ]" (10)
  1. 1. Development of Internet of Things Sensor-based Information System Robust to Security Attack
    Junhyeok Yun, Mihui Kim, Vol. 23, No. 4, pp. 95-107, Aug. 2022
    10.7472/jksii.2022.23.4.95
    Keywords: Internet of Things, Information System, Network Security, Big-Data
  2. 2. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    10.7472/jksii.2012.13.2.59
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing
  3. 3. The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution
    Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
    Keywords: Multicast Security, Group Key Management, Network Security
  4. 4. Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention
    Cheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
    Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution
  5. 5. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  6. 6. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  7. 7. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security
  8. 8. Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links
    Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
    Keywords: Network Security, Attack Detection, Attack Traffic Modeling
  9. 9. A Proposal for Transmission Method of Safety CRL to Distributed OCSP Group
  10. 10. The Design and Analysis of Secure DRM Systems using Steganography
    Do Kyoung-Hwa, Jun Moon-Seog, Vol. 4, No. 5, pp. 21-30, Oct. 2003
    Keywords: Steganography, DRM, Information Hiding, Network Security