Digital Library
Search: "[ author: 강유 ]" (5)
Implementation of the Automated De-Obfuscation Tool to Restore Working Executable
You-jin Kang,
Moon Chan Park,
Dong Hoon Lee,
Vol. 27, No. 4, pp. 785-802,
Aug.
2017
10.13089/JKIISC.2017.27.4.785
Keywords: De-obfuscation, Program Analysis, software protection, Automatic Analysis Tool
10.13089/JKIISC.2017.27.4.785
Keywords: De-obfuscation, Program Analysis, software protection, Automatic Analysis Tool
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
You-Sung Kang,
Yong-Je Choi,
Doo-Ho Choi,
Sang-Yeoun Lee,
Heyung-Sup Lee,
Vol. 20, No. 4, pp. 117-134,
Aug.
2010
10.13089/JKIISC.2010.20.4.117
Keywords: RFID security, RFID security protocol, ISO/IEC 29167-6, RFID authentication
10.13089/JKIISC.2010.20.4.117
Keywords: RFID security, RFID security protocol, ISO/IEC 29167-6, RFID authentication
Source-Location Privacy in Wireless Sensor Networks
Song-Woo Lee,
Young-Hoon Park,
Ju-Hyung Son,
Yu Kang,
Jin-Gi Choe,
Ho-Gun Moon,
Seung-Woo Seo,
Vol. 17, No. 2, pp. 125-138,
Apr.
2007
10.13089/JKIISC.2007.17.2.125
Keywords: location privacy of source, Eavesdropper, anonymity of source, degree of anonymity, Entropy
10.13089/JKIISC.2007.17.2.125
Keywords: location privacy of source, Eavesdropper, anonymity of source, degree of anonymity, Entropy
An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence
Choi Yoon-Ho,
Park Jong-Ho,
Kim Sang-Kon,
Kang Yu,
Choe Jin-Gi,
Moon Ho-Gun,
Rhee Myung-Su,
Seo Seung-Woo,
Vol. 16, No. 4, pp. 69-82,
Aug.
2006
10.13089/JKIISC.2006.16.4.69
Keywords: Computer Forensics, Infringement Severity, Evidence Collection
10.13089/JKIISC.2006.16.4.69
Keywords: Computer Forensics, Infringement Severity, Evidence Collection
Design of Accounting and Security Sessions for IEEE 802.11 Network
,
,
,
,
,
Vol. 13, No. 6, pp. 85-96,
Dec.
2003
10.13089/JKIISC.2003.13.6.85
Keywords: Wireless LAN, IEEE 802. 1x, IEEE 802.11i, accounting
10.13089/JKIISC.2003.13.6.85
Keywords: Wireless LAN, IEEE 802. 1x, IEEE 802.11i, accounting
Category Search
Publications
-
Vol. 34, 2024
-
Vol. 33, 2023
-
Vol. 32, 2022
-
Vol. 31, 2021
-
Vol. 30, 2020
-
Vol. 29, 2019
-
Vol. 28, 2018
-
Vol. 27, 2017
-
Vol. 26, 2016
-
Vol. 25, 2015
-
Vol. 24, 2014
-
Vol. 23, 2013
-
Vol. 22, 2012
-
Vol. 21, 2011
-
Vol. 20, 2010
-
Vol. 19, 2009
-
Vol. 18, 2008
-
Vol. 17, 2007
-
Vol. 16, 2006
-
Vol. 15, 2005
-
Vol. 14, 2004
-
Vol. 13, 2003
-
Vol. 12, 2002
-
Vol. 11, 2001
-
Vol. 10, 2000
-
Vol. 9, 1999
-
Vol. 8, 1998
-
Vol. 7, 1997
-
Vol. 6, 1996
-
Vol. 5, 1995
-
Vol. 4, 1994
-
Vol. 2, 1992
-
Vol. 1, 1991