Digital Library[ Search Result ]
Search : "[ author: Han Jae Jeong ]" (5)
A Study on Evaluation Scheme for Exchangeable CAS (XCAS)
Yu Na Hwang Han Jae Jeong Dong Ho Won Seung Joo Kim
Vol. 17, No. 5, pp. 407-414, Oct. 2010
10.3745/KIPSTC.2010.17.5.407
Vol. 17, No. 5, pp. 407-414, Oct. 2010
10.3745/KIPSTC.2010.17.5.407
A Study on Appropriate Device Authentication Scheme Based PKI for Exchangeable CAS(XCAS)
Yu Na Hwang Han Jae Jeong Dong Ho Won Seung Joo Kim
Vol. 17, No. 4, pp. 347-360, Aug. 2010
10.3745/KIPSTC.2010.17.4.347
Vol. 17, No. 4, pp. 347-360, Aug. 2010
10.3745/KIPSTC.2010.17.4.347
A Key Management Scheme for Radio Frequency Communication Environment
Song Yi Kim Kwang Woo Lee Han Jae Jeong Young Jun Cho Wook Jae Cha
Seung Joo Kim Dong Ho Won
Vol. 16, No. 4, pp. 439-448, Aug. 2009
10.3745/KIPSTC.2009.16.4.439
Seung Joo Kim Dong Ho Won
Vol. 16, No. 4, pp. 439-448, Aug. 2009
10.3745/KIPSTC.2009.16.4.439
Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications
Dong Hyun Choi Sung Jin Lee Han Jae Jeong Dong Joo Kang Hak Man Kim
Kyung Sin Kim Dong Ho Won Seung Joo Kim
Vol. 16, No. 1, pp. 37-50, Feb. 2009
10.3745/KIPSTC.2009.16.1.37
Kyung Sin Kim Dong Ho Won Seung Joo Kim
Vol. 16, No. 1, pp. 37-50, Feb. 2009
10.3745/KIPSTC.2009.16.1.37
A Study on Development of Information Security Evaluation Model
Soon Haeng Hur Kwang Woo Lee Hea Suk Jo Han Jae Jeong Woong Ryul Jeon
Dong Ho Won Seung Joo Kim
Vol. 15, No. 3, pp. 173-190, Jun. 2008
10.3745/KIPSTC.2008.15.3.173
Dong Ho Won Seung Joo Kim
Vol. 15, No. 3, pp. 173-190, Jun. 2008
10.3745/KIPSTC.2008.15.3.173