The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2004 (conf/iccsa/2004-1)

  1. Jin Ok Kim, Sung Jin Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee
    Face Detection by Facial Features with Color Images and Face Recognition Using PCA. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1-8 [Conf]
  2. Jin-Sung Yoon, Joo-Chul Park, Seok-Woo Jang, Gye-Young Kim
    A Shakable Snake for Estimation of Image Contours. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:9-16 [Conf]
  3. Joong-Jae Lee, Won Kim 0002, Jeong-Hee Cha, Gye-Young Kim, Hyung-Il Choi
    A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained Ambiguity. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:17-24 [Conf]
  4. Junchul Chun, Goorack Park, Changho An
    A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:25-32 [Conf]
  5. Mi Gyung Cho, Am Sok Oh, Byung kwan Lee
    A Feature-Based Algorithm for Recognizing Gestures on Portable Computers. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:33-40 [Conf]
  6. Jeong-Hee Cha, HyoJong Jang, Gye-Young Kim, Hyung-Il Choi
    Fingerprint Matching Based on Linking Information Structure of Minutiae. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:41-48 [Conf]
  7. YoungSik Choi, KiJoo Kim
    Video Summarization Using Fuzzy One-Class Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:49-56 [Conf]
  8. Maria Hong, Euisun Kang, Sungmin Um, Dongho Kim, Younghwan Lim
    A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminals. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:57-64 [Conf]
  9. Kyung-Woo Kang
    A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurg. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:65-72 [Conf]
  10. Sunwoong Yang, MoonJoon Kim, JaeHeung Park, Hoon Chang
    A Study on Methodology for Enhancing Reliability of Datapath. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:73-80 [Conf]
  11. Jin Kim, Dong Hoi Kim, Saangyong Uhmn
    A Useful Method for Multiple Sequence Alignment and Its Implementation. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:81-88 [Conf]
  12. Yong-Wan Roh, Kwang-Seok Hong, Hyon-Gu Lee
    A Research on the Stochastic Model for Spoken Language Understanding. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:89-96 [Conf]
  13. Bobby D. Gerardo, Jaewan Lee, Jung-sik Lee, Mingi Park, Malrey Lee
    The Association Rule Algorithm with Missing Data in Data Mining. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:97-105 [Conf]
  14. Jang-Wu Jo, Byeong-Mo Chang
    Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:106-113 [Conf]
  15. Kang Soo Tae, Hee Yong Youn, Gyung-Leen Park
    On Negation-Based Conscious Agent. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:114-121 [Conf]
  16. Seok-Woo Han, He-Jue Eun, Yong-Sung Kim, László T. Kóczy
    A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Document. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:122-133 [Conf]
  17. Kweon Yang Kim, Byong Gul Lee, Dong Kwon Hong
    A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Features. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:134-141 [Conf]
  18. Kyohyeok Kwon, Seong-Jin Ahn, Jin-Wook Chung
    Network Security Management Using ARP Spoofing. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:142-149 [Conf]
  19. ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon
    A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:150-158 [Conf]
  20. Han-Ki Lee, Geun-Sil Song, Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee
    A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:159-166 [Conf]
  21. Il-Sun You, Kyungsan Cho
    A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:167-174 [Conf]
  22. Jung-Sun Kim, Minsoo Kim, BongNam Noh
    A Fuzzy Expert System for Network Forensics. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:175-182 [Conf]
  23. D. S. Kim, Tai-Myung Chung
    A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:183-190 [Conf]
  24. Young J. Han, Jin S. Yang, Beom H. Chang, Jung C. Na, Tai-Myung Chung
    The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:191-198 [Conf]
  25. Miyoung Kim, Misun Kim, Youngsong Mun
    Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:199-206 [Conf]
  26. Changyeol Choi, Sungsoo Kim, We-Duke Cho
    Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:207-214 [Conf]
  27. Soon Seok Kim, Sung Kwon Kim, Hong-Jin Park
    New Approach for Secure and Efficient Metering in the Web Advertising. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:215-221 [Conf]
  28. Young-Hwan Oh, Hae-Young Bae
    MLS/SDM: Multi-level Secure Spatial Data Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:222-229 [Conf]
  29. Jun-Hyung Park, Minsoo Kim, BongNam Noh
    Detection Techniques for ELF Executable File Using Assembly Instruction Searching. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:230-237 [Conf]
  30. Hyung-Jin Lim, Hak-Ju Kim, Tae-Kyung Kim, Tai-Myung Chung
    Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:238-245 [Conf]
  31. Byoung-Joon Min, Sung Ki Kim, Chaetae Im
    Committing Secure Results with Replicated Servers. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:246-253 [Conf]
  32. Won Goo Lee, Jae-Kwang Lee
    Applied Research of Active Network to Control Network Traffic in Virtual Battlefield. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:254-261 [Conf]
  33. Miyoung Kim, Misun Kim, Youngsong Mun
    Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:262-269 [Conf]
  34. Seokhoon Kang, Iksoo Kim, Yoseop Woo
    Analysis of Performance for MCVoD System. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:270-277 [Conf]
  35. In Hwa Lee, Sung-Jo Kim
    A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow Labels. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:278-285 [Conf]
  36. Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang, SangKeun Lee
    Energy-Efficient Message Management Algorithms in HMIPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:286-293 [Conf]
  37. Sungkeun Lee, Wongeun Oh, Myunghyun Song, Hyun Yoe, Jingwang Koh, Changryul Jung
    A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved Throughput. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:294-301 [Conf]
  38. Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi
    PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:302-309 [Conf]
  39. Kwang-Ok Lee, Sang-Hyun Bae, Jin-Gwang Koh, Chang-Hee Kwon, Chong-Soo Cheung, In-Ho Ra
    Traffic Control Scheme of ABR Service Using NLMS in ATM Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:310-318 [Conf]
  40. Yong-won Kwon, So-Hyun Ryu, Chang-Sung Jeong, Hyoungwoo Park
    XML-Based Workflow Description Language for Grid Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:319-327 [Conf]
  41. Seonho Kim, Miyoun Yoon, Yongtae Shin
    Placement Algorithm of Web Server Replicas. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:328-336 [Conf]
  42. Chang Yun Jeong, Yong-Sung Kim, Yan Ha
    XML-OGL: UML-Based Graphical Web Query Language for XML Documents. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:337-344 [Conf]
  43. Iksoo Kim, Yoseop Woo, Hyunchul Kang, Backhyun Kim, Jinsong Ouyang
    Layered Web-Caching Technique for VOD Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:345-351 [Conf]
  44. Dong Su Nam, Chan-Hyun Youn, Bong-Hwan Lee, Gari Clifford, Jennifer Healey
    QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:352-359 [Conf]
  45. Younghun Ko, Jaehyoun Kim, Hyunseung Choo
    Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:360-369 [Conf]
  46. Eui-nam Huh
    A New Architecture Design for Differentiated Resource Sharing on Grid Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:370-377 [Conf]
  47. Duckki Kim, Youngsong Mun
    An Experiment and Design of Web-Based Instruction Model for Collaboration Learning. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:378-385 [Conf]
  48. Young-Hwan You, Taewon Jang, Min-goo Kang, Hyung-Woo Lee, Hwa-Seop Lim, Yong-Soo Choi, Hyoung-Kyu Song
    Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:386-393 [Conf]
  49. Hyoung-Kyu Song, Min-goo Kang, Ou-Seb Lee, Pan-Yuh Joo, We-Duke Cho, Mi-Jeong Kim, Young-Hwan You
    PMEPR Reduction Algorithms for STBC-OFDM Signals. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:394-401 [Conf]
  50. JaeMin Kwak, HeeGok Kang, SungEon Cho, Hyun Yoe, Jin-Gwang Koh
    An Effcient Image Transmission System Adopting OFDM Based Sequence Reordering Method in Non-flat Fading Channel. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:402-409 [Conf]
  51. Jong Woo Kim, Seong-Seok Park, Chang Soo Kim, Yugyung Lee
    The Efficient Web-Based Mobile GIS Service System through Reduction of Digital Map. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:410-417 [Conf]
  52. Sangjoon Park, Eunjoo Jeong, Byunggi Kim
    Reducing Link Loss in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:418-425 [Conf]
  53. Woojin Lee, Yongsun Cho, Kiwon Chong
    A Web Based Model for Analyzing Compliance of Mobile Content. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:426-433 [Conf]
  54. Kee-Hyun Choi, Kyung-Soo Jang, Dong Ryeol Shin
    Delay and Collision Reduction Mechanism for Distributed Fair Scheduling in Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:434-441 [Conf]
  55. Yong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee
    Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:442-450 [Conf]
  56. Eun-ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung
    Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:451-460 [Conf]
  57. Haeng-Kon Kim, Tai-Hoon Kim
    Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:461-470 [Conf]
  58. Dae Hyun Yum, Pil Joong Lee
    A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:471-480 [Conf]
  59. Sun-Myung Hwang
    A Design of Configuration Management Practices and CMPET in Common Criteria Based on Software Process Improvement Activity. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:481-490 [Conf]
  60. Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee
    The Design and Development for Risk Analysis Automatic Tool. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:491-499 [Conf]
  61. Kyeongmo Park
    A Fault-Tolerant Mobile Agent Model in Replicated Secure Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:500-509 [Conf]
  62. Hyeong Seon Yoo, Dongryeol Lee
    Computation of Multiplicative Inverses in GF(2n) Using Palindromic Representation. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:510-516 [Conf]
  63. Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon
    A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:517-526 [Conf]
  64. IkSu Park, Seung Bae Park, ByeongKyun Oh
    User Authentication Protocol Based on Human Memorable Password and Using RSA. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:527-536 [Conf]
  65. Ghita Kouadri Mostéfaoui, Mansoo Kim, Mokdong Chung
    Supporting Adaptive Security Levels in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:537-546 [Conf]
  66. Yongsu Park, Jaeheung Lee, Yookun Cho
    Intrusion Detection Using Noisy Training Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:547-556 [Conf]
  67. Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park
    A Study on Key Recovery Agent Protection Profile Having Composition Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:557-566 [Conf]
  68. Hyung-Jong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho
    Simulation-Based Security Testing for Continuity of Essential Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:567-576 [Conf]
  69. Ha Jin Hwang, Soung Won Kim
    NextPDM: Improving Productivity and Enhancing the Reusability with a Customizing Framework Toolkit. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:577-586 [Conf]
  70. Hangkon Kim
    A Framework for Security Assurance in Component Based Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:587-596 [Conf]
  71. Sangkyun Kim, Choon Seong Leem
    An Information Engineering Methodology for the Security Strategy Planning. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:597-607 [Conf]
  72. Sang-ho Kim, Choon Seong Leem
    A Case Study in Applying Common Criteria to Development Process of Virtual Private Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:608-616 [Conf]
  73. Ihn-Han Bae, Sun-Jin Oh
    A Pointer Forwarding Scheme for Fault-Tolerant Location Management in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:617-624 [Conf]
  74. Ho-jun Shin, Soo-Gi Lee
    Architecture Environments for E-business Agent Based on Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:625-634 [Conf]
  75. Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun
    Multi-modal Biometrics System Using Face and Signature. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:635-644 [Conf]
  76. Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won
    Simple and Efficient Group Key Agreement Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:645-654 [Conf]
  77. Jin Ok Kim, Kyong Sok Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee
    On Facial Expression Recognition Using the Virtual Image Masking for a Security System. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:655-662 [Conf]
  78. Yumi Choi, Hyunseung Choo, Byong-Lyol Lee
    Secure Handoff Based on Dual Session Keys in Mobile IP with AAA. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:663-672 [Conf]
  79. Mihui Kim, Kijoon Chae
    Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:673-682 [Conf]
  80. Eun-Jung Choi, Hyung-Jong Kim, Myuhng Joo Kim
    DMKB : A Defense Mechanism Knowledge Base. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:683-692 [Conf]
  81. Jin S. Yang, Young J. Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na
    A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:693-700 [Conf]
  82. HyungHyo Lee, Seungyong Lee, BongNam Noh
    A New Role-Based Authorization Model in a Corporate Workflow Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:701-710 [Conf]
  83. Hea Suk Jo, Hee Yong Youn
    A New Synchronization Protocol for Authentication in Wireless LAN Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:711-721 [Conf]
  84. Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee
    A Robust Image Authentication Method Surviving Acceptable Modifications. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:722-727 [Conf]
  85. Taekyoung Kwon, Jaeil Lee
    Practical Digital Signature Generation Using Biometrics. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:728-737 [Conf]
  86. Changnam Kim, Young Sin Kim, Eui-nam Huh, Youngsong Mun
    Performance Improvement in Mobile IPv6 Using AAA and Fast Handoff. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:738-745 [Conf]
  87. Young Sin Kim, Eui-nam Huh, Jun Hwang, Byung-wook Lee
    An Efficient Key Agreement Protocol for Secure Authentication. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:746-754 [Conf]
  88. Choong Seon Hong, Joon Heo
    A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:755-764 [Conf]
  89. Hoseong Jeon, Hyunseung Choo, Jai-Ho Oh
    IDentification Key Based AAA Mechanism in Mobile IP Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:765-775 [Conf]
  90. Kiyoung Moon, Namje Park, Jongsu Jang, Sungwon Sohn, Jaecheol Ryou
    An Integrated XML Security Mechanism for Mobile Grid Application. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:776-783 [Conf]
  91. Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn
    Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:784-791 [Conf]
  92. Chi Hyung In, Choong Seon Hong, Il Gyu Song
    A Scheme for Improving WEP Key Transmission between APs in Wireless Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:792-801 [Conf]
  93. Dae Hyun Yum, Pil Joong Lee
    Generic Construction of Certificateless Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:802-811 [Conf]
  94. Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda
    Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:812-820 [Conf]
  95. Stefan Lindskog, Johan Strandbergh, Mikael Hackman, Erland Jonsson
    A Content-Independent Scalable Encryption Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:821-830 [Conf]
  96. Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger
    Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:831-840 [Conf]
  97. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:841-850 [Conf]
  98. José María Sierra, Julio César Hernández, Almudena Alcaide, Joaquín Torres Márquez
    Validating the Use of BAN LOGIC. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:851-858 [Conf]
  99. L. Javier García-Villalba
    Use of Spectral Techniques in the Design of Symmetrical Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:859-867 [Conf]
  100. Robson de Oliveira Albuquerque, Rafael T. de Sousa Jr., Tamer Américo da Silva, Ricardo Staciarini Puttini, Cláudia J. Barenco Abbas, L. Javier García-Villalba
    Load Balancing and Survivability for Network Services Based on Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:868-881 [Conf]
  101. Francesco Palmieri
    A Scalable PKI for Secure Routing in the Internet. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:882-894 [Conf]
  102. Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:895-902 [Conf]
  103. Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou
    Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:903-914 [Conf]
  104. Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee
    DDoS Attack Defense Architecture Using Active Network Technology. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:915-923 [Conf]
  105. Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger
    A Voting System with Trusted Verifiable Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:924-937 [Conf]
  106. Mohamed Mejri
    Chaotic Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:938-948 [Conf]
  107. Eva Ponce, Alfonso Durán, Teresa Sánchez
    Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:949-959 [Conf]
  108. Julio César Hernández Castro, José María Sierra, André Seznec
    The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:960-967 [Conf]
  109. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    A Survey of Web Services Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:968-977 [Conf]
  110. Yongsu Park, Yookun Cho
    Fair Certified E-mail Protocols with Delivery Deadline Agreement. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:978-987 [Conf]
  111. Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang
    QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:988-997 [Conf]
  112. Hyeong-Ju Kim, Byoung-Koo Kim, Ik-Kyun Kim
    Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:998-1006 [Conf]
  113. Bonghan Kim, Han-Jin Cho, Jae-Kwang Lee
    Efficient Key Distribution Protocol for Secure Multicast Communication. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1007-1016 [Conf]
  114. Taehyung Park, Sangkeon Lee
    A Bayesian Approach for Estimating Link Travel Time on Urban Arterial Road Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1017-1015 [Conf]
  115. Won Shik Na, Jeom Goo Kim, Intae Ryoo
    Perimeter Defence Policy Model of Cascade MPLS VPN Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1026-1034 [Conf]
  116. Sun-Sik Roh, Su-Hyun Kim, Gwang-Hyun Kim
    Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1035-1043 [Conf]
  117. Yonghak Ahn, Kiok Ahn, Oksam Chae
    Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1044-1051 [Conf]
  118. Tai-Hoon Kim, Dong Chun Lee
    Reduction Method of Threat Phrases by Classifying Assets. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1052-1059 [Conf]
  119. Seong-sik Hong, Hwang-bin Ryou
    Anomaly Detection Using Sequential Properties of Packets in Mobile Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1060-1068 [Conf]
  120. Sang-ho Kim, Choon Seong Leem
    A Case Study in Applying Common Criteria to Development Process to Improve Security of Software Products. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1069-1077 [Conf]
  121. Hyuncheol Kim, Seong-Jin Ahn, Daeho Kim, Sunghae Kim, Jin-Wook Chung
    A New Recovery Scheme with Reverse Shared Risk Link Group in GMPLS-Based WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1078-1087 [Conf]
  122. Taehyung Park, Sangkeon Lee, Young-Jun Moon
    Real Time Estimation of Bus Arrival Time under Mobile Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1088-1096 [Conf]
  123. Dong Chun Lee
    Call Tracking and Location Updating Using DHS in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1097-1104 [Conf]
  124. Young-Chul Shim, Nam-Chang Kim, Ho Seok Kang
    Improving TCP Performance over Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1105-1114 [Conf]
  125. Dongkeun Lee, Keecheon Kim, Sunyoung Han
    Design of Mobile Network Route Optimization Based on the Hierarchical Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1115-1124 [Conf]
  126. Young-Cheol Bang, Inki Hong, Sungchang Lee, ByungJun Ahn
    On Algorithms for Minimum-Cost Quickest Paths with Multiple Delay-Bounds. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1125-1133 [Conf]
  127. Dae Sun Kim, Choong Seon Hong
    A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1134-1143 [Conf]
  128. Jongjin Park, Youngsong Mun
    The Layer 2 Handoff Scheme for Mobile IP over IEEE 802.11 Wireless LAN. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1144-1150 [Conf]
  129. Hyun Gon Kim, Doo Ho Choi
    Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Hando. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1151-1158 [Conf]
  130. Min-Su Kim, Ki Jin Kwon, Min Young Chung, Tae-Jin Lee, Jaehyung Park
    A Modified AODV Protocol with Multi-paths Considering Classes of Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1159-1168 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002