119 | -- | 121 | Sang Yeob Oh, Supratip Ghose, Yu-Keum Jeong, Joong-Kyung Ryu, Jung-Soo Han. Convergence security systems |
123 | -- | 128 | Eun-Hee Goo, Seung-dae Lee. Reconfigurable real number field elliptic curve cryptography to improve the security |
129 | -- | 136 | Sunghyuck Hong. Efficient and secure DNS cyber shelter on DDoS attacks |
137 | -- | 142 | Yoon-Su Jeong, Yong-Tae Kim. A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography |
143 | -- | 148 | Jung Hoon Kim, Keun-Ho Lee. Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures |
149 | -- | 155 | Aeri Lee. Authentication scheme for smart learning system in the cloud computing environment |
157 | -- | 164 | Sang-Chul Lee, Kwang Hyuk Im. Banking behavior in security and multi-channel environment |
165 | -- | 171 | SunMoon Jo, Kyungyong Chung. An efficient thread partition policy for secure functional language |
173 | -- | 179 | Sumi Shin, Suhyeon Yoo, Hyesun Kim, Taeseok Lee. Association analysis of technology convergence based on information system utilization |
181 | -- | 192 | Sung Choi. Study on model fostering for cloud service brokerage |