To search, Click below search items.
All Published Papers Search Service
Title
A Case Study in Applying IT Security Evaluation on Common Criteria to Development Process of MTOS 7.5
Author
Shim ho Kim
Vol. 6 No. 1 pp. 234~239
Keywords
IT security evaluation, Common Criteria, Development process, MTOS 7.5
A Processor Development Environment C-DASH
Hideaki Yanagisawa, Minoru Uehara, Hideki Mori
Vol. 6 No. 1 pp. 227~233
ISA (Instruction Set Architecture), HW/SW Codesign (A Processor Development Environment), C-DASH (C-like Design Automation Shell, HDL (Hardware Description Language)
1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
Vol. 6 No. 1 pp. 217~226
Electronic voting, Privacy, Security, Ballot-cancellation, Cryptography
Architectures for Self-Healing Databases under Cyber Attacks
Peng Liu, Jiwu Jing
Vol. 6 No. 1 pp. 204~216
Self-Healing Databases, Cyber Security, Architectures