인터넷 정보 보호
Dec 08, 2017
출판사 : 영진닷컴
2002년 05월 30일 출간
The Concentric Clustering for Efficient Energy Consumption in PEGASIS
SNMP-based Integrated Wire/wireless Device Management System
The Dynamic Buffer Overflow Detection and Prevention Tool for Windows Executables...
Local Authentication Scheme based on AAA in Mobile IPv6 Networks
Modeling Active Cyber Attack for Network Vulnerability Assessment (SCIE)
Session Key Forwarding Scheme based on AAA Architecture in Wireless Networks (SCIE)
The effective group key agreement protocol for ad-hoc networks for medical emerge...
Minimal Public-Key Based Authentication Mechanism in Mobile IPv6 Networks
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks
Security Analysis of Extensible Authentication Protocol Methods based on AAA Arch...
Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN
Context-Role Based Access Control for Context-Aware Application (SCIE)
Performance Evaluation of Public Key based Mechanisms for Mobile IPv4 Authenticat...
Context-Role Based Access Control for Intelligent Space (SCIE)
An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment (SCIE)
An Analysis of Policy Provisioning Complexity in Accordance with the Application ...
Comparative Analysis of IPv6 VPN Transition in NEMO Environments (SCIE)
Qualitative Method-based The Effective Risk Mitigation Method in The Risk Managem...
A Study on Agent-based Integrated Security Management System for Managing Heterog...
Enhanced SCORM Sequencing Rulefor e-Learning System (SCIE)