Subjects :
Malicious user
논문 검색결과
| Type |
Year |
Title |
Cited |
Download |
|
Conference
|
2024 |
Blockchain-Based Autonomous Cooperation Intelligence Model Exchange and Security Enhancement
Jihoon Seo International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.408-409 |
0 |
원문
|
|
Conference
|
2011 |
A Design of Authentication Architecture for Service Safety in Heterogeneous Network
Yoon Sunghyun International Conference on Signal Processing and Communication Systems (ICSPCS) 2011, pp.1-5 |
0 |
원문
|
|
Conference
|
2011 |
A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment
정성모 International Conference on Advanced Communication and Networking (ACN) 2011 (CCIS 199), v.199, pp.31-35 |
3 |
원문
|
|
Journal
|
2009 |
Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
구우권 Information Processing Letters, v.109, no.23-24, pp.1260-1262 |
11 |
원문
|
|
Conference
|
2007 |
Analysis of SEND Protocol through Implementation and Simulation
An Gaeil International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 |
16 |
원문
|
|
Conference
|
2006 |
Effective Control of Abnormal Neighbor Discovery Congestion on IPv6 Local Area Network
An Gaeil International Conference on Ubiquitous Intelligence and Computing (UIC) 2006 (LNCS 4159), v.4159, pp.966-976 |
1 |
원문
|
|
Conference
|
2005 |
The Implementation of the Link Security Module in an EPON Access Network
Kim Kwang Ok Asia-Pacific Conference on Communications (APCC) 2005, pp.1-5 |
7 |
원문
|
|
Conference
|
2003 |
MF (Minority First) scheme for defeating distributed denial of service attacks
An Gaeil International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 |
7 |
원문
|
특허 검색결과
| Status |
Year |
Patent Name |
Country |
Family Pat. |
KIPRIS |
|
No search results. |
연구보고서 검색결과
| Type |
Year |
Research Project |
Primary Investigator |
Download |
|
No search results. |