Digital Library[ Search Result ]
Search : "[ author: Seung Joo Kim ]" (15)
A Study on Evaluation Scheme for Exchangeable CAS (XCAS)
Yu Na Hwang Han Jae Jeong Dong Ho Won Seung Joo Kim
Vol. 17, No. 5, pp. 407-414, Oct. 2010
10.3745/KIPSTC.2010.17.5.407
Vol. 17, No. 5, pp. 407-414, Oct. 2010
10.3745/KIPSTC.2010.17.5.407
Vulnerabilities Analysis of the OTP Implemented on a PC
Woo Chan Hong Kwang Woo Lee Seung Joo Kim Dong Ho Won
Vol. 17, No. 4, pp. 361-370, Aug. 2010
10.3745/KIPSTC.2010.17.4.361
Vol. 17, No. 4, pp. 361-370, Aug. 2010
10.3745/KIPSTC.2010.17.4.361
A Study on Appropriate Device Authentication Scheme Based PKI for Exchangeable CAS(XCAS)
Yu Na Hwang Han Jae Jeong Dong Ho Won Seung Joo Kim
Vol. 17, No. 4, pp. 347-360, Aug. 2010
10.3745/KIPSTC.2010.17.4.347
Vol. 17, No. 4, pp. 347-360, Aug. 2010
10.3745/KIPSTC.2010.17.4.347
A Study of Protection Profile and Analysis of Related Standard for Internet Banking Systems
Hea Suk Jo Seung Joo Kim Dong Ho Won
Vol. 17, No. 3, pp. 223-232, Jun. 2010
10.3745/KIPSTC.2010.17.3.223
Vol. 17, No. 3, pp. 223-232, Jun. 2010
10.3745/KIPSTC.2010.17.3.223
Security Analysis on Commercial Online Music Streaming Service and Countermeasures
Sang Sik Lee Dong Hyun Choi Dong Ho Won Seung Joo Kim
Vol. 16, No. 6, pp. 681-690, Dec. 2009
10.3745/KIPSTC.2009.16.6.681
Vol. 16, No. 6, pp. 681-690, Dec. 2009
10.3745/KIPSTC.2009.16.6.681
Improvement of Internet Content Filtering Software
Woong Ryul Jeon Hyun Seung Lee Soon Hang Hur Kyung Sin Kim Dong Ho Won
Seung Joo Kim
Vol. 16, No. 5, pp. 543-554, Oct. 2009
10.3745/KIPSTC.2009.16.5.543
Seung Joo Kim
Vol. 16, No. 5, pp. 543-554, Oct. 2009
10.3745/KIPSTC.2009.16.5.543
A Key Management Scheme for Radio Frequency Communication Environment
Song Yi Kim Kwang Woo Lee Han Jae Jeong Young Jun Cho Wook Jae Cha
Seung Joo Kim Dong Ho Won
Vol. 16, No. 4, pp. 439-448, Aug. 2009
10.3745/KIPSTC.2009.16.4.439
Seung Joo Kim Dong Ho Won
Vol. 16, No. 4, pp. 439-448, Aug. 2009
10.3745/KIPSTC.2009.16.4.439
Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications
Dong Hyun Choi Sung Jin Lee Han Jae Jeong Dong Joo Kang Hak Man Kim
Kyung Sin Kim Dong Ho Won Seung Joo Kim
Vol. 16, No. 1, pp. 37-50, Feb. 2009
10.3745/KIPSTC.2009.16.1.37
Kyung Sin Kim Dong Ho Won Seung Joo Kim
Vol. 16, No. 1, pp. 37-50, Feb. 2009
10.3745/KIPSTC.2009.16.1.37
A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems
Hea Suk Jo Kwang Woo Lee Woong Ryul Jeon Yun Ho Lee Seung Joo Kim
Dong Ho Won
Vol. 16, No. 1, pp. 1-12, Feb. 2009
10.3745/KIPSTC.2009.16.1.1
Dong Ho Won
Vol. 16, No. 1, pp. 1-12, Feb. 2009
10.3745/KIPSTC.2009.16.1.1
CipherSuite Setting Problem of SSL Protocol and It`s Solutions
Yun Young Lee Soon Haeng Hur Sang Joo Park Dong Hwi Shin Dong Ho Won
Seung Joo Kim
Vol. 15, No. 5, pp. 359-366, Oct. 2008
10.3745/KIPSTC.2008.15.5.359
Seung Joo Kim
Vol. 15, No. 5, pp. 359-366, Oct. 2008
10.3745/KIPSTC.2008.15.5.359