Digital Library


Search: "[ keyword: EAP ]" (10)
    A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development
    , , , , , Vol. 33, No. 5, pp. 827-846, Oct. 2023
    10.13089/JKIISC.2023.33.5.827

    A Study on the Application Method of Fuzz Testing to Domestic Weapon Systems Considering the Software Development Life Cycle (SDLC)
    조현석, 강수진, 신영섭, 조규태, Vol. 31, No. 2, pp. 279-289, Apr. 2021
    10.13089/JKIISC.2021.31.2.279
    Keywords: Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis, Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis

    A Case Study on the Application of RMF to Domestic Weapon System
    조현석, 차성용, 김승주, Vol. 29, No. 6, pp. 1463-1475, Dec. 2019
    10.13089/JKIISC.2019.29.6.1463
    Keywords: RMF(Risk Management Framework), Weapon System, Secure SDLC, RMF(Risk Management Framework), Weapon System, Secure SDLC

    A Study on the Cyber Weapons Classification System
    이용석, 권헌영, 최정민, 임종인, Vol. 28, No. 4, pp. 905-917, Jul. 2018
    10.13089/JKIISC.2018.28.4.905
    Keywords: Cyber weapons, Cyber weapons classification, Kind of Cyber weapons, Cyber weapons, Cyber weapons classification, Kind of Cyber weapons

    Automated Method for Detecting OOB Vulnerability of Heap Memory Using Dynamic Symbolic Execution
    강상용, 노봉남, 박성현, Vol. 28, No. 4, pp. 919-928, Jul. 2018
    10.13089/JKIISC.2018.28.4.919
    Keywords: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds

    Research for Construction Cybersecurity Test and Evaluation of Weapon System
    이지섭, 차성용, 백승수, 김승주, Vol. 28, No. 3, pp. 765-774, May. 2018
    10.13089/JKIISC.2018.28.3.765
    Keywords: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems

    A Hierarchical Authentication for Proxy Mobile IPv6 Networks
    KyungJoon Kim, JaeJong Baek, JooSeok Song, Vol. 24, No. 1, pp. 165-170, Feb. 2014
    10.13089/JKIISC.2014.24.1.165
    Keywords: PMIPv6, EAP-AKA, authentication, key agreement

    Improved AKA Protocol for Efficient Management of Authentication Data in 3GPP Network
    Doo-Hwan Kim, Sou-Hwan Jung, Vol. 19, No. 2, pp. 93-104, Apr. 2009
    10.13089/JKIISC.2009.19.2.93
    Keywords: EAP-AKA, 3GPP, authentication

    Attribute-base Authenticated Key Agreement Protocol over Home Network
    Won-Jin Lee, Il-Soo Jeon, Vol. 18, No. 5, pp. 49-58, Oct. 2008
    10.13089/JKIISC.2008.18.5.49
    Keywords: Home network security, EEAP, ABE, User Authentication, Key agreement protocol

    Efficient security mechanism in 3GPP-WLAN interworking
    , Vol. 14, No. 3, pp. 137-144, Jun. 2004
    10.13089/JKIISC.2004.14.3.137
    Keywords: 3GPP, WLAN, authentication, key agreement, AKA, EAP