Conferences in DBLP
Jin Ok Kim , Sung Jin Seo , Chin Hyun Chung , Jun Hwang , Woongjae Lee Face Detection by Facial Features with Color Images and Face Recognition Using PCA. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1-8 [Conf ] Jin-Sung Yoon , Joo-Chul Park , Seok-Woo Jang , Gye-Young Kim A Shakable Snake for Estimation of Image Contours. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:9-16 [Conf ] Joong-Jae Lee , Won Kim 0002 , Jeong-Hee Cha , Gye-Young Kim , Hyung-Il Choi A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained Ambiguity. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:17-24 [Conf ] Junchul Chun , Goorack Park , Changho An A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Model. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:25-32 [Conf ] Mi Gyung Cho , Am Sok Oh , Byung kwan Lee A Feature-Based Algorithm for Recognizing Gestures on Portable Computers. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:33-40 [Conf ] Jeong-Hee Cha , HyoJong Jang , Gye-Young Kim , Hyung-Il Choi Fingerprint Matching Based on Linking Information Structure of Minutiae. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:41-48 [Conf ] YoungSik Choi , KiJoo Kim Video Summarization Using Fuzzy One-Class Support Vector Machine. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:49-56 [Conf ] Maria Hong , Euisun Kang , Sungmin Um , Dongho Kim , Younghwan Lim A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminals. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:57-64 [Conf ] Kyung-Woo Kang A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurg. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:65-72 [Conf ] Sunwoong Yang , MoonJoon Kim , JaeHeung Park , Hoon Chang A Study on Methodology for Enhancing Reliability of Datapath. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:73-80 [Conf ] Jin Kim , Dong Hoi Kim , Saangyong Uhmn A Useful Method for Multiple Sequence Alignment and Its Implementation. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:81-88 [Conf ] Yong-Wan Roh , Kwang-Seok Hong , Hyon-Gu Lee A Research on the Stochastic Model for Spoken Language Understanding. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:89-96 [Conf ] Bobby D. Gerardo , Jaewan Lee , Jung-sik Lee , Mingi Park , Malrey Lee The Association Rule Algorithm with Missing Data in Data Mining. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:97-105 [Conf ] Jang-Wu Jo , Byeong-Mo Chang Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:106-113 [Conf ] Kang Soo Tae , Hee Yong Youn , Gyung-Leen Park On Negation-Based Conscious Agent. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:114-121 [Conf ] Seok-Woo Han , He-Jue Eun , Yong-Sung Kim , László T. Kóczy A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Document. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:122-133 [Conf ] Kweon Yang Kim , Byong Gul Lee , Dong Kwon Hong A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Features. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:134-141 [Conf ] Kyohyeok Kwon , Seong-Jin Ahn , Jin-Wook Chung Network Security Management Using ARP Spoofing. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:142-149 [Conf ] ChangKyun Kim , JaeCheol Ha , Sung-Hyun Kim , Seokyu Kim , Sung-Ming Yen , Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:150-158 [Conf ] Han-Ki Lee , Geun-Sil Song , Mi-Ae Kim , Kil-Sang Yoo , Won-Hyung Lee A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:159-166 [Conf ] Il-Sun You , Kyungsan Cho A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:167-174 [Conf ] Jung-Sun Kim , Minsoo Kim , BongNam Noh A Fuzzy Expert System for Network Forensics. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:175-182 [Conf ] D. S. Kim , Tai-Myung Chung A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:183-190 [Conf ] Young J. Han , Jin S. Yang , Beom H. Chang , Jung C. Na , Tai-Myung Chung The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:191-198 [Conf ] Miyoung Kim , Misun Kim , Youngsong Mun Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:199-206 [Conf ] Changyeol Choi , Sungsoo Kim , We-Duke Cho Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:207-214 [Conf ] Soon Seok Kim , Sung Kwon Kim , Hong-Jin Park New Approach for Secure and Efficient Metering in the Web Advertising. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:215-221 [Conf ] Young-Hwan Oh , Hae-Young Bae MLS/SDM: Multi-level Secure Spatial Data Model. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:222-229 [Conf ] Jun-Hyung Park , Minsoo Kim , BongNam Noh Detection Techniques for ELF Executable File Using Assembly Instruction Searching. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:230-237 [Conf ] Hyung-Jin Lim , Hak-Ju Kim , Tae-Kyung Kim , Tai-Myung Chung Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:238-245 [Conf ] Byoung-Joon Min , Sung Ki Kim , Chaetae Im Committing Secure Results with Replicated Servers. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:246-253 [Conf ] Won Goo Lee , Jae-Kwang Lee Applied Research of Active Network to Control Network Traffic in Virtual Battlefield. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:254-261 [Conf ] Miyoung Kim , Misun Kim , Youngsong Mun Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:262-269 [Conf ] Seokhoon Kang , Iksoo Kim , Yoseop Woo Analysis of Performance for MCVoD System. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:270-277 [Conf ] In Hwa Lee , Sung-Jo Kim A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow Labels. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:278-285 [Conf ] Sun Ok Yang , SungSuk Kim , Chong-Sun Hwang , SangKeun Lee Energy-Efficient Message Management Algorithms in HMIPv6. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:286-293 [Conf ] Sungkeun Lee , Wongeun Oh , Myunghyun Song , Hyun Yoe , Jingwang Koh , Changryul Jung A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved Throughput. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:294-301 [Conf ] Hyung-Woo Lee , Min-goo Kang , Chang-Won Choi PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:302-309 [Conf ] Kwang-Ok Lee , Sang-Hyun Bae , Jin-Gwang Koh , Chang-Hee Kwon , Chong-Soo Cheung , In-Ho Ra Traffic Control Scheme of ABR Service Using NLMS in ATM Network. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:310-318 [Conf ] Yong-won Kwon , So-Hyun Ryu , Chang-Sung Jeong , Hyoungwoo Park XML-Based Workflow Description Language for Grid Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:319-327 [Conf ] Seonho Kim , Miyoun Yoon , Yongtae Shin Placement Algorithm of Web Server Replicas. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:328-336 [Conf ] Chang Yun Jeong , Yong-Sung Kim , Yan Ha XML-OGL: UML-Based Graphical Web Query Language for XML Documents. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:337-344 [Conf ] Iksoo Kim , Yoseop Woo , Hyunchul Kang , Backhyun Kim , Jinsong Ouyang Layered Web-Caching Technique for VOD Services. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:345-351 [Conf ] Dong Su Nam , Chan-Hyun Youn , Bong-Hwan Lee , Gari Clifford , Jennifer Healey QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:352-359 [Conf ] Younghun Ko , Jaehyoun Kim , Hyunseung Choo Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:360-369 [Conf ] Eui-nam Huh A New Architecture Design for Differentiated Resource Sharing on Grid Service. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:370-377 [Conf ] Duckki Kim , Youngsong Mun An Experiment and Design of Web-Based Instruction Model for Collaboration Learning. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:378-385 [Conf ] Young-Hwan You , Taewon Jang , Min-goo Kang , Hyung-Woo Lee , Hwa-Seop Lim , Yong-Soo Choi , Hyoung-Kyu Song Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:386-393 [Conf ] Hyoung-Kyu Song , Min-goo Kang , Ou-Seb Lee , Pan-Yuh Joo , We-Duke Cho , Mi-Jeong Kim , Young-Hwan You PMEPR Reduction Algorithms for STBC-OFDM Signals. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:394-401 [Conf ] JaeMin Kwak , HeeGok Kang , SungEon Cho , Hyun Yoe , Jin-Gwang Koh An Effcient Image Transmission System Adopting OFDM Based Sequence Reordering Method in Non-flat Fading Channel. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:402-409 [Conf ] Jong Woo Kim , Seong-Seok Park , Chang Soo Kim , Yugyung Lee The Efficient Web-Based Mobile GIS Service System through Reduction of Digital Map. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:410-417 [Conf ] Sangjoon Park , Eunjoo Jeong , Byunggi Kim Reducing Link Loss in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:418-425 [Conf ] Woojin Lee , Yongsun Cho , Kiwon Chong A Web Based Model for Analyzing Compliance of Mobile Content. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:426-433 [Conf ] Kee-Hyun Choi , Kyung-Soo Jang , Dong Ryeol Shin Delay and Collision Reduction Mechanism for Distributed Fair Scheduling in Wireless LANs. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:434-441 [Conf ] Yong Ho Hwang , Sang Gyoo Sim , Pil Joong Lee Bit-Serial Multipliers for Exponentiation and Division in GF(2m ) Using Irreducible AOP. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:442-450 [Conf ] Eun-ser Lee , Kyung-Whan Lee , Tai-Hoon Kim , Il-Hong Jung Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:451-460 [Conf ] Haeng-Kon Kim , Tai-Hoon Kim Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:461-470 [Conf ] Dae Hyun Yum , Pil Joong Lee A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:471-480 [Conf ] Sun-Myung Hwang A Design of Configuration Management Practices and CMPET in Common Criteria Based on Software Process Improvement Activity. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:481-490 [Conf ] Young-Hwan Bang , Yoon-Jung Jung , In-Jung Kim , Namhoon Lee , Gang-Soo Lee The Design and Development for Risk Analysis Automatic Tool. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:491-499 [Conf ] Kyeongmo Park A Fault-Tolerant Mobile Agent Model in Replicated Secure Services. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:500-509 [Conf ] Hyeong Seon Yoo , Dongryeol Lee Computation of Multiplicative Inverses in GF(2n ) Using Palindromic Representation. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:510-516 [Conf ] Hoon Jae Lee , ManKi Ahn , Seongan Lim , Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:517-526 [Conf ] IkSu Park , Seung Bae Park , ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:527-536 [Conf ] Ghita Kouadri Mostéfaoui , Mansoo Kim , Mokdong Chung Supporting Adaptive Security Levels in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:537-546 [Conf ] Yongsu Park , Jaeheung Lee , Yookun Cho Intrusion Detection Using Noisy Training Data. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:547-556 [Conf ] Dae-Hee Seo , Im-Yeong Lee , Hee-Un Park A Study on Key Recovery Agent Protection Profile Having Composition Function. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:557-566 [Conf ] Hyung-Jong Kim , Joonmo Kim , Kang Shin Lee , Hongsub Lee , Tae Ho Cho Simulation-Based Security Testing for Continuity of Essential Service. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:567-576 [Conf ] Ha Jin Hwang , Soung Won Kim NextPDM: Improving Productivity and Enhancing the Reusability with a Customizing Framework Toolkit. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:577-586 [Conf ] Hangkon Kim A Framework for Security Assurance in Component Based Development. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:587-596 [Conf ] Sangkyun Kim , Choon Seong Leem An Information Engineering Methodology for the Security Strategy Planning. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:597-607 [Conf ] Sang-ho Kim , Choon Seong Leem A Case Study in Applying Common Criteria to Development Process of Virtual Private Network. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:608-616 [Conf ] Ihn-Han Bae , Sun-Jin Oh A Pointer Forwarding Scheme for Fault-Tolerant Location Management in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:617-624 [Conf ] Ho-jun Shin , Soo-Gi Lee Architecture Environments for E-business Agent Based on Security. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:625-634 [Conf ] Dae Jong Lee , Keun Chang Kwak , Jun Oh Min , Myung-Geun Chun Multi-modal Biometrics System Using Face and Signature. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:635-644 [Conf ] Junghyun Nam , Seokhyang Cho , Seungjoo Kim , Dongho Won Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:645-654 [Conf ] Jin Ok Kim , Kyong Sok Seo , Chin Hyun Chung , Jun Hwang , Woongjae Lee On Facial Expression Recognition Using the Virtual Image Masking for a Security System. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:655-662 [Conf ] Yumi Choi , Hyunseung Choo , Byong-Lyol Lee Secure Handoff Based on Dual Session Keys in Mobile IP with AAA. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:663-672 [Conf ] Mihui Kim , Kijoon Chae Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:673-682 [Conf ] Eun-Jung Choi , Hyung-Jong Kim , Myuhng Joo Kim DMKB : A Defense Mechanism Knowledge Base. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:683-692 [Conf ] Jin S. Yang , Young J. Han , Dong-Soo Kim , Beom-Hwan Chang , Tai-Myoung Chung , Jung-Chan Na A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:693-700 [Conf ] HyungHyo Lee , Seungyong Lee , BongNam Noh A New Role-Based Authorization Model in a Corporate Workflow Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:701-710 [Conf ] Hea Suk Jo , Hee Yong Youn A New Synchronization Protocol for Authentication in Wireless LAN Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:711-721 [Conf ] Mi-Ae Kim , Geun-Sil Song , Won-Hyung Lee A Robust Image Authentication Method Surviving Acceptable Modifications. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:722-727 [Conf ] Taekyoung Kwon , Jaeil Lee Practical Digital Signature Generation Using Biometrics. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:728-737 [Conf ] Changnam Kim , Young Sin Kim , Eui-nam Huh , Youngsong Mun Performance Improvement in Mobile IPv6 Using AAA and Fast Handoff. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:738-745 [Conf ] Young Sin Kim , Eui-nam Huh , Jun Hwang , Byung-wook Lee An Efficient Key Agreement Protocol for Secure Authentication. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:746-754 [Conf ] Choong Seon Hong , Joon Heo A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:755-764 [Conf ] Hoseong Jeon , Hyunseung Choo , Jai-Ho Oh IDentification Key Based AAA Mechanism in Mobile IP Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:765-775 [Conf ] Kiyoung Moon , Namje Park , Jongsu Jang , Sungwon Sohn , Jaecheol Ryou An Integrated XML Security Mechanism for Mobile Grid Application. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:776-783 [Conf ] Namje Park , Kiyoung Moon , Jongsu Jang , Sungwon Sohn Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:784-791 [Conf ] Chi Hyung In , Choong Seon Hong , Il Gyu Song A Scheme for Improving WEP Key Transmission between APs in Wireless Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:792-801 [Conf ] Dae Hyun Yum , Pil Joong Lee Generic Construction of Certificateless Encryption. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:802-811 [Conf ] Antonio Izquierdo , José María Sierra , Julio César Hernández Castro , Arturo Ribagorda Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:812-820 [Conf ] Stefan Lindskog , Johan Strandbergh , Mikael Hackman , Erland Jonsson A Content-Independent Scalable Encryption Model. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:821-830 [Conf ] Magdalena Payeras-Capellà , Josep Lluís Ferrer-Gomila , Llorenç Huguet i Rotger Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:831-840 [Conf ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:841-850 [Conf ] José María Sierra , Julio César Hernández , Almudena Alcaide , Joaquín Torres Márquez Validating the Use of BAN LOGIC. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:851-858 [Conf ] L. Javier García-Villalba Use of Spectral Techniques in the Design of Symmetrical Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:859-867 [Conf ] Robson de Oliveira Albuquerque , Rafael T. de Sousa Jr. , Tamer Américo da Silva , Ricardo Staciarini Puttini , Cláudia J. Barenco Abbas , L. Javier García-Villalba Load Balancing and Survivability for Network Services Based on Intelligent Agents. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:868-881 [Conf ] Francesco Palmieri A Scalable PKI for Secure Routing in the Internet. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:882-894 [Conf ] Jeeyeon Kim , Seungjoo Kim , Jin Kwak , Dongho Won Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:895-902 [Conf ] Mildrey Carbonell , Jose Antonio Onieva , Javier Lopez , Deborah Galpert , Jianying Zhou Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:903-914 [Conf ] Choong Seon Hong , Yoshiaki Kasahara , Dea Hwan Lee DDoS Attack Defense Architecture Using Active Network Technology. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:915-923 [Conf ] Macià Mut Puigserver , Josep Lluís Ferrer-Gomila , Llorenç Huguet i Rotger A Voting System with Trusted Verifiable Services. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:924-937 [Conf ] Mohamed Mejri Chaotic Protocols. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:938-948 [Conf ] Eva Ponce , Alfonso Durán , Teresa Sánchez Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:949-959 [Conf ] Julio César Hernández Castro , José María Sierra , André Seznec The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:960-967 [Conf ] Carlos Gutiérrez , Eduardo Fernández-Medina , Mario Piattini A Survey of Web Services Security. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:968-977 [Conf ] Yongsu Park , Yookun Cho Fair Certified E-mail Protocols with Delivery Deadline Agreement. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:978-987 [Conf ] Seung-Won Shin , Kwang-ho Baik , Ki-Young Kim , Jong-Soo Jang QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:988-997 [Conf ] Hyeong-Ju Kim , Byoung-Koo Kim , Ik-Kyun Kim Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:998-1006 [Conf ] Bonghan Kim , Han-Jin Cho , Jae-Kwang Lee Efficient Key Distribution Protocol for Secure Multicast Communication. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1007-1016 [Conf ] Taehyung Park , Sangkeon Lee A Bayesian Approach for Estimating Link Travel Time on Urban Arterial Road Network. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1017-1015 [Conf ] Won Shik Na , Jeom Goo Kim , Intae Ryoo Perimeter Defence Policy Model of Cascade MPLS VPN Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1026-1034 [Conf ] Sun-Sik Roh , Su-Hyun Kim , Gwang-Hyun Kim Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1035-1043 [Conf ] Yonghak Ahn , Kiok Ahn , Oksam Chae Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1044-1051 [Conf ] Tai-Hoon Kim , Dong Chun Lee Reduction Method of Threat Phrases by Classifying Assets. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1052-1059 [Conf ] Seong-sik Hong , Hwang-bin Ryou Anomaly Detection Using Sequential Properties of Packets in Mobile Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1060-1068 [Conf ] Sang-ho Kim , Choon Seong Leem A Case Study in Applying Common Criteria to Development Process to Improve Security of Software Products. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1069-1077 [Conf ] Hyuncheol Kim , Seong-Jin Ahn , Daeho Kim , Sunghae Kim , Jin-Wook Chung A New Recovery Scheme with Reverse Shared Risk Link Group in GMPLS-Based WDM Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1078-1087 [Conf ] Taehyung Park , Sangkeon Lee , Young-Jun Moon Real Time Estimation of Bus Arrival Time under Mobile Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1088-1096 [Conf ] Dong Chun Lee Call Tracking and Location Updating Using DHS in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1097-1104 [Conf ] Young-Chul Shim , Nam-Chang Kim , Ho Seok Kang Improving TCP Performance over Mobile IPv6. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1105-1114 [Conf ] Dongkeun Lee , Keecheon Kim , Sunyoung Han Design of Mobile Network Route Optimization Based on the Hierarchical Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1115-1124 [Conf ] Young-Cheol Bang , Inki Hong , Sungchang Lee , ByungJun Ahn On Algorithms for Minimum-Cost Quickest Paths with Multiple Delay-Bounds. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1125-1133 [Conf ] Dae Sun Kim , Choong Seon Hong A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1134-1143 [Conf ] Jongjin Park , Youngsong Mun The Layer 2 Handoff Scheme for Mobile IP over IEEE 802.11 Wireless LAN. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1144-1150 [Conf ] Hyun Gon Kim , Doo Ho Choi Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Hando. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1151-1158 [Conf ] Min-Su Kim , Ki Jin Kwon , Min Young Chung , Tae-Jin Lee , Jaehyung Park A Modified AODV Protocol with Multi-paths Considering Classes of Services. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:1159-1168 [Conf ]