Digital Library
Search: "[ keyword: EAP ]" (10)
A Study on the Application Method of Fuzz Testing to Domestic Weapon Systems Considering the Software Development Life Cycle (SDLC)
조현석,
강수진,
신영섭,
조규태,
Vol. 31, No. 2, pp. 279-289,
Apr.
2021
10.13089/JKIISC.2021.31.2.279
Keywords: Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis, Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis
10.13089/JKIISC.2021.31.2.279
Keywords: Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis, Weapon System, SDLC, Fuzz Testing, Security Vulnerability Analysis
A Case Study on the Application of RMF to Domestic Weapon System
조현석,
차성용,
김승주,
Vol. 29, No. 6, pp. 1463-1475,
Dec.
2019
10.13089/JKIISC.2019.29.6.1463
Keywords: RMF(Risk Management Framework), Weapon System, Secure SDLC, RMF(Risk Management Framework), Weapon System, Secure SDLC
10.13089/JKIISC.2019.29.6.1463
Keywords: RMF(Risk Management Framework), Weapon System, Secure SDLC, RMF(Risk Management Framework), Weapon System, Secure SDLC
A Study on the Cyber Weapons Classification System
이용석,
권헌영,
최정민,
임종인,
Vol. 28, No. 4, pp. 905-917,
Jul.
2018
10.13089/JKIISC.2018.28.4.905
Keywords: Cyber weapons, Cyber weapons classification, Kind of Cyber weapons, Cyber weapons, Cyber weapons classification, Kind of Cyber weapons
10.13089/JKIISC.2018.28.4.905
Keywords: Cyber weapons, Cyber weapons classification, Kind of Cyber weapons, Cyber weapons, Cyber weapons classification, Kind of Cyber weapons
Automated Method for Detecting OOB Vulnerability of Heap Memory Using Dynamic Symbolic Execution
강상용,
노봉남,
박성현,
Vol. 28, No. 4, pp. 919-928,
Jul.
2018
10.13089/JKIISC.2018.28.4.919
Keywords: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds
10.13089/JKIISC.2018.28.4.919
Keywords: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds
Research for Construction Cybersecurity Test and Evaluation of Weapon System
이지섭,
차성용,
백승수,
김승주,
Vol. 28, No. 3, pp. 765-774,
May.
2018
10.13089/JKIISC.2018.28.3.765
Keywords: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems
10.13089/JKIISC.2018.28.3.765
Keywords: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems
A Hierarchical Authentication for Proxy Mobile IPv6 Networks
KyungJoon Kim,
JaeJong Baek,
JooSeok Song,
Vol. 24, No. 1, pp. 165-170,
Feb.
2014
10.13089/JKIISC.2014.24.1.165
Keywords: PMIPv6, EAP-AKA, authentication, key agreement
10.13089/JKIISC.2014.24.1.165
Keywords: PMIPv6, EAP-AKA, authentication, key agreement
Improved AKA Protocol for Efficient Management of Authentication Data in 3GPP Network
Doo-Hwan Kim,
Sou-Hwan Jung,
Vol. 19, No. 2, pp. 93-104,
Apr.
2009
10.13089/JKIISC.2009.19.2.93
Keywords: EAP-AKA, 3GPP, authentication
10.13089/JKIISC.2009.19.2.93
Keywords: EAP-AKA, 3GPP, authentication
Attribute-base Authenticated Key Agreement Protocol over Home Network
Won-Jin Lee,
Il-Soo Jeon,
Vol. 18, No. 5, pp. 49-58,
Oct.
2008
10.13089/JKIISC.2008.18.5.49
Keywords: Home network security, EEAP, ABE, User Authentication, Key agreement protocol
10.13089/JKIISC.2008.18.5.49
Keywords: Home network security, EEAP, ABE, User Authentication, Key agreement protocol
Efficient security mechanism in 3GPP-WLAN interworking
,
Vol. 14, No. 3, pp. 137-144,
Jun.
2004
10.13089/JKIISC.2004.14.3.137
Keywords: 3GPP, WLAN, authentication, key agreement, AKA, EAP
10.13089/JKIISC.2004.14.3.137
Keywords: 3GPP, WLAN, authentication, key agreement, AKA, EAP