Digital Library


Search: "[ author: 강유 ]" (5)
    Implementation of the Automated De-Obfuscation Tool to Restore Working Executable
    You-jin Kang, Moon Chan Park, Dong Hoon Lee, Vol. 27, No. 4, pp. 785-802, Aug. 2017
    10.13089/JKIISC.2017.27.4.785
    Keywords: De-obfuscation, Program Analysis, software protection, Automatic Analysis Tool

    Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
    You-Sung Kang, Yong-Je Choi, Doo-Ho Choi, Sang-Yeoun Lee, Heyung-Sup Lee, Vol. 20, No. 4, pp. 117-134, Aug. 2010
    10.13089/JKIISC.2010.20.4.117
    Keywords: RFID security, RFID security protocol, ISO/IEC 29167-6, RFID authentication

    Source-Location Privacy in Wireless Sensor Networks
    Song-Woo Lee, Young-Hoon Park, Ju-Hyung Son, Yu Kang, Jin-Gi Choe, Ho-Gun Moon, Seung-Woo Seo, Vol. 17, No. 2, pp. 125-138, Apr. 2007
    10.13089/JKIISC.2007.17.2.125
    Keywords: location privacy of source, Eavesdropper, anonymity of source, degree of anonymity, Entropy

    An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence
    Choi Yoon-Ho, Park Jong-Ho, Kim Sang-Kon, Kang Yu, Choe Jin-Gi, Moon Ho-Gun, Rhee Myung-Su, Seo Seung-Woo, Vol. 16, No. 4, pp. 69-82, Aug. 2006
    10.13089/JKIISC.2006.16.4.69
    Keywords: Computer Forensics, Infringement Severity, Evidence Collection

    Design of Accounting and Security Sessions for IEEE 802.11 Network
    , , , , , Vol. 13, No. 6, pp. 85-96, Dec. 2003
    10.13089/JKIISC.2003.13.6.85
    Keywords: Wireless LAN, IEEE 802. 1x, IEEE 802.11i, accounting