To search, Click below search items.
All Published Papers Search Service
Title
A Study on DRM System for On/Off Line Key Authentication
Author
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Seog Jun
Vol. 6 No. 2 pp. 233~238
Keywords
DRM, Symmetric key, Agent, PKI.
Methodology of Secure and Efficient Source Authentication Protocol for Multicast Data Streams
Sanghoon Jeon, Jeonghoon Jeon, Moonseog Jun
Vol. 6 No. 2 pp. 226~232
Multicast, Source Authentication, Streaming Data security.
Analyzing Impacts of Software Diversity on Worm Propagation in Peer-to-Peer Networks
Ying Zhou, Zhong-fu Wu, Feng Li, Hao Wang, Zheng-zhou Zhu
Vol. 6 No. 2 pp. 219~225
Peer-to-Peer Network, Peer-to-Peer Worm, Software Diversity, Worm Propagation.
Combining Multiple Techniques for Intrusion Detection
Ronghua Yao, Qijun Zhao, Hongtao Lu
Vol. 6 No. 2 pp. 208~218
intrusion detection system, combined detection model, fusion method.