Abstract is missing.
- Face Detection by Facial Features with Color Images and Face Recognition Using PCAJin Ok Kim, Sung Jin Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee. 1-8 [doi]
- A Shakable Snake for Estimation of Image ContoursJin-Sung Yoon, Joo-Chul Park, Seok-Woo Jang, Gye-Young Kim. 9-16 [doi]
- A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained AmbiguityJoong-Jae Lee, Won Kim 0002, Jeong-Hee Cha, Gye-Young Kim, Hyung-Il Choi. 17-24 [doi]
- A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge ModelJunchul Chun, Goorack Park, Changho An. 25-32 [doi]
- A Feature-Based Algorithm for Recognizing Gestures on Portable ComputersMi Gyung Cho, Am Sok Oh, Byung kwan Lee. 33-40 [doi]
- Fingerprint Matching Based on Linking Information Structure of MinutiaeJeong-Hee Cha, HyoJong Jang, Gye-Young Kim, Hyung-Il Choi. 41-48 [doi]
- Video Summarization Using Fuzzy One-Class Support Vector MachineYoungSik Choi, Kijoo Kim. 49-56 [doi]
- A Transcode and Prefetch Technique of Multimedia Presentations for Mobile TerminalsMaria Hong, Euisun Kang, Sungmin Um, DongHo Kim, Younghwan Lim. 57-64 [doi]
- A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurgKyung-Woo Kang. 65-72 [doi]
- A Study on Methodology for Enhancing Reliability of DatapathSunwoong Yang, MoonJoon Kim, Jaeheung Park, Hoon Chang. 73-80 [doi]
- A Useful Method for Multiple Sequence Alignment and Its ImplementationJin Kim, Dong Hoi Kim, Saangyong Uhmn. 81-88 [doi]
- A Research on the Stochastic Model for Spoken Language UnderstandingYong-Wan Roh, Kwang-Seok Hong, Hyon-Gu Lee. 89-96 [doi]
- The Association Rule Algorithm with Missing Data in Data MiningBobby D. Gerardo, Jaewan Lee, Jung-sik Lee, Mingi Park, Malrey Lee. 97-105 [doi]
- Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal FlowJang-Wu Jo, Byeong-Mo Chang. 106-113 [doi]
- On Negation-Based Conscious AgentKang Soo Tae, Hee Yong Youn, Gyung-Leen Park. 114-121 [doi]
- A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of DocumentSeok-Woo Han, He-Jue Eun, Yong-Sung Kim, László T. Kóczy. 122-133 [doi]
- A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic FeaturesKweon Yang Kim, Byong Gul Lee, Dong Kwon Hong. 134-141 [doi]
- Network Security Management Using ARP SpoofingKyohyeok Kwon, Seong-Jin Ahn, Jin-Wook Chung. 142-149 [doi]
- A Secure and Practical CRT-Based RSA to Resist Side Channel AttacksChangKyun Kim, JaeCheol Ha, Sung Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon. 150-158 [doi]
- A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient SignHan-Ki Lee, Geun-Sil Song, Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee. 159-166 [doi]
- A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding UpdatesIl-Sun You, Kyungsan Cho. 167-174 [doi]
- A Fuzzy Expert System for Network ForensicsJung-Sun Kim, Minsoo Kim, BongNam Noh. 175-182 [doi]
- A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing ModelsD. S. Kim, Tai-Myung Chung. 183-190 [doi]
- The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance EvaluationsYoung J. Han, Jin S. Yang, Beom H. Chang, Jung C. Na, Tai-Myung Chung. 191-198 [doi]
- Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IPMiyoung Kim, Misun Kim, Youngsong Mun. 199-206 [doi]
- Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing SystemsChangyeol Choi, Sungsoo Kim, We-Duke Cho. 207-214 [doi]
- New Approach for Secure and Efficient Metering in the Web AdvertisingSoon Seok Kim, Sung Kwon Kim, Hong-Jin Park. 215-221 [doi]
- MLS/SDM: Multi-level Secure Spatial Data ModelYoung-Hwan Oh, Hae-Young Bae. 222-229 [doi]
- Detection Techniques for ELF Executable File Using Assembly Instruction SearchingJun-Hyung Park, Minsoo Kim, BongNam Noh. 230-237 [doi]
- Secure Communication Scheme Applying MX Resource Record in DNSSEC DomainHyung-Jin Lim, Hak-Ju Kim, Tae-Kyung Kim, Tai-Myung Chung. 238-245 [doi]
- Committing Secure Results with Replicated ServersByoung-Joon Min, Sung Ki Kim, Chaetae Im. 246-253 [doi]
- Applied Research of Active Network to Control Network Traffic in Virtual BattlefieldWon Goo Lee, Jae Kwang Lee. 254-261 [doi]
- Design and Implementation of the HoneyPot System with Focusing on the Session RedirectionMiyoung Kim, Misun Kim, Youngsong Mun. 262-269 [doi]
- Analysis of Performance for MCVoD SystemSeokhoon Kang, Iksoo Kim, Yoseop Woo. 270-277 [doi]
- A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow LabelsIn Hwa Lee, Sung-Jo Kim. 278-285 [doi]
- Energy-Efficient Message Management Algorithms in HMIPv6Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang, SangKeun Lee. 286-293 [doi]
- A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved ThroughputSungkeun Lee, Wongeun Oh, Myunghyun Song, Hyun Yoe, Jin-Gwang Koh, Changryul Jung. 294-301 [doi]
- PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS AttackHyung-Woo Lee, Min-goo Kang, Chang-Won Choi. 302-309 [doi]
- Traffic Control Scheme of ABR Service Using NLMS in ATM NetworkKwang-Ok Lee, Sang-Hyun Bae, Jin-Gwang Koh, Chang-Hee Kwon, Chong-Soo Cheung, In-Ho Ra. 310-318 [doi]
- XML-Based Workflow Description Language for Grid ApplicationsYong-won Kwon, So-Hyun Ryu, Chang-Sung Jeong, Hyoungwoo Park. 319-327 [doi]
- Placement Algorithm of Web Server ReplicasSeonho Kim, Miyoun Yoon, Yongtae Shin. 328-336 [doi]
- XML-OGL: UML-Based Graphical Web Query Language for XML DocumentsChang Yun Jeong, Yong-Sung Kim, Yan Ha. 337-344 [doi]
- Layered Web-Caching Technique for VOD ServicesIksoo Kim, Yoseop Woo, Hyunchul Kang, Backhyun Kim, Jinsong Ouyang. 345-351 [doi]
- QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram ApplicationDong Su Nam, Chan-Hyun Youn, Bong-Hwan Lee, Gari Clifford, Jennifer Healey. 352-359 [doi]
- Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web ApplicationsYounghun Ko, Jaehyoun Kim, Hyunseung Choo. 360-369 [doi]
- A New Architecture Design for Differentiated Resource Sharing on Grid ServiceEui-nam Huh. 370-377 [doi]
- An Experiment and Design of Web-Based Instruction Model for Collaboration LearningDuckki Kim, Youngsong Mun. 378-385 [doi]
- Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading ChannelsYoung-Hwan You, Taewon Jang, Min-goo Kang, Hyung-Woo Lee, Hwa-Seop Lim, Yong-Soo Choi, Hyoung-Kyu Song. 386-393 [doi]
- PMEPR Reduction Algorithms for STBC-OFDM SignalsHyoung-Kyu Song, Min-goo Kang, Ou-Seb Lee, Pan-Yuh Joo, We-Duke Cho, Mi-Jeong Kim, Young-Hwan You. 394-401 [doi]
- An Effcient Image Transmission System Adopting OFDM Based Sequence Reordering Method in Non-flat Fading ChannelJaeMin Kwak, HeeGok Kang, SungEon Cho, Hyun Yoe, Jin-Gwang Koh. 402-409 [doi]
- The Efficient Web-Based Mobile GIS Service System through Reduction of Digital MapJong Woo Kim, Seong-Seok Park, Chang Soo Kim, Yugyung Lee. 410-417 [doi]
- Reducing Link Loss in Ad Hoc NetworksSangjoon Park, Eunjoo Jeong, Byunggi Kim. 418-425 [doi]
- A Web Based Model for Analyzing Compliance of Mobile ContentWoojin Lee, Yongsun Cho, Kiwon Chong. 426-433 [doi]
- Delay and Collision Reduction Mechanism for Distributed Fair Scheduling in Wireless LANsKee-Hyun Choi, Kyung-Soo Jang, Dong Ryeol Shin. 434-441 [doi]
- Bit-Serial Multipliers for Exponentiation and Division in GF(2:::m:::) Using Irreducible AOPYong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee. 442-450 [doi]
- Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504Eun-ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung. 451-460 [doi]
- Design on Mobile Secure Electronic Transaction Protocol with Component Based DevelopmentHaeng-Kon Kim, Tai-Hoon Kim. 461-470 [doi]
- A Distributed Online Certificate Status Protocol Based on GQ Signature SchemeDae Hyun Yum, Pil Joong Lee. 471-480 [doi]
- A Design of Configuration Management Practices and CMPET in Common Criteria Based on Software Process Improvement ActivitySun-Myung Hwang. 481-490 [doi]
- The Design and Development for Risk Analysis Automatic ToolYoung-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee. 491-499 [doi]
- A Fault-Tolerant Mobile Agent Model in Replicated Secure ServicesKyeongmo Park. 500-509 [doi]
- Computation of Multiplicative Inverses in GF(2:::n:::) Using Palindromic RepresentationHyeong Seon Yoo, Dongryeol Lee. 510-516 [doi]
- A Study on Smart Card Security Evaluation Criteria for Side Channel AttacksHoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon. 517-526 [doi]
- User Authentication Protocol Based on Human Memorable Password and Using RSAIkSu Park, Seung Bae Park, ByeongKyun Oh. 527-536 [doi]
- Supporting Adaptive Security Levels in Heterogeneous EnvironmentsGhita Kouadri Mostéfaoui, Mansoo Kim, Mokdong Chung. 537-546 [doi]
- Intrusion Detection Using Noisy Training DataYongsu Park, Jaeheung Lee, Yookun Cho. 547-556 [doi]
- A Study on Key Recovery Agent Protection Profile Having Composition FunctionDae-Hee Seo, Im-Yeong Lee, Hee-Un Park. 557-566 [doi]
- Simulation-Based Security Testing for Continuity of Essential ServiceHyung-Jong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho. 567-576 [doi]
- NextPDM: Improving Productivity and Enhancing the Reusability with a Customizing Framework ToolkitHa Jin Hwang, Soung Won Kim. 577-586 [doi]
- A Framework for Security Assurance in Component Based DevelopmentHangKon Kim. 587-596 [doi]
- An Information Engineering Methodology for the Security Strategy PlanningSangkyun Kim, Choon Seong Leem. 597-607 [doi]
- A Case Study in Applying Common Criteria to Development Process of Virtual Private NetworkSang-Ho Kim, Choon Seong Leem. 608-616 [doi]
- A Pointer Forwarding Scheme for Fault-Tolerant Location Management in Mobile NetworksIhn-Han Bae, Sun-Jin Oh. 617-624 [doi]
- Architecture Environments for E-business Agent Based on SecurityHo-jun Shin, Soo-Gi Lee. 625-634 [doi]
- Multi-modal Biometrics System Using Face and SignatureDae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun. 635-644 [doi]
- Simple and Efficient Group Key Agreement Based on FactoringJunghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won. 645-654 [doi]
- On Facial Expression Recognition Using the Virtual Image Masking for a Security SystemJin Ok Kim, Kyong Sok Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee. 655-662 [doi]
- Secure Handoff Based on Dual Session Keys in Mobile IP with AAAYumi Choi, Hyunseung Choo, Byong-Lyol Lee. 663-672 [doi]
- Detection and Identification Mechanism against Spoofed Traffic Using Distributed AgentsMihui Kim, Kijoon Chae. 673-682 [doi]
- DMKB : A Defense Mechanism Knowledge BaseEun-Jung Choi, Hyung-Jong Kim, Myuhng Joo Kim. 683-692 [doi]
- A Fine-Grained Taxonomy of Security Vulnerability in Active Network EnvironmentsJin S. Yang, Young J. Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na. 693-700 [doi]
- A New Role-Based Authorization Model in a Corporate Workflow SystemsHyungHyo Lee, Seungyong Lee, BongNam Noh. 701-710 [doi]
- A New Synchronization Protocol for Authentication in Wireless LAN EnvironmentHea Suk Jo, Hee Yong Youn. 711-721 [doi]
- A Robust Image Authentication Method Surviving Acceptable ModificationsMi-Ae Kim, Geun-Sil Song, Won-Hyung Lee. 722-727 [doi]
- Practical Digital Signature Generation Using BiometricsTaekyoung Kwon, Jaeil Lee. 728-737 [doi]
- Performance Improvement in Mobile IPv6 Using AAA and Fast HandoffChangnam Kim, Young Sin Kim, Eui-nam Huh, Youngsong Mun. 738-745 [doi]
- An Efficient Key Agreement Protocol for Secure AuthenticationYoung Sin Kim, Eui-nam Huh, Jun Hwang, Byungwook Lee. 746-754 [doi]
- A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3Choong Seon Hong, Joon Heo. 755-764 [doi]
- IDentification Key Based AAA Mechanism in Mobile IP NetworksHoseong Jeon, Hyunseung Choo, Jai-Ho Oh. 765-775 [doi]
- An Integrated XML Security Mechanism for Mobile Grid ApplicationKiyoung Moon, Namje Park, Jongsu Jang, Sungwon Sohn, Jaecheol Ryou. 776-783 [doi]
- Development of XKMS-Based Service Component for Using PKI in XML Web Services EnvironmentNamje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn. 784-791 [doi]
- A Scheme for Improving WEP Key Transmission between APs in Wireless EnvironmentChi Hyung In, Choong Seon Hong, Il Gyu Song. 792-801 [doi]
- Generic Construction of Certificateless EncryptionDae Hyun Yum, Pil Joong Lee. 802-811 [doi]
- Security Issues in Network File SystemsAntonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda. 812-820 [doi]
- A Content-Independent Scalable Encryption ModelStefan Lindskog, Johan Strandbergh, Mikael Hackman, Erland Jonsson. 821-830 [doi]
- Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic CashMagdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger. 831-840 [doi]
- N3: A Geometrical Approach for Network Intrusion Detection at the Application LayerJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo. 841-850 [doi]
- Validating the Use of BAN LOGICJosé María Sierra, Julio César Hernández Castro, Almudena Alcaide, Joaquín Torres Márquez. 851-858 [doi]
- Use of Spectral Techniques in the Design of Symmetrical CryptosystemsL. Javier García-Villalba. 859-867 [doi]
- Load Balancing and Survivability for Network Services Based on Intelligent AgentsRobson de Oliveira Albuquerque, Rafael T. de Sousa Jr., Tamer Américo da Silva, Ricardo Staciarini Puttini, Cláudia J. Barenco Abbas, L. Javier García-Villalba. 868-881 [doi]
- A Scalable PKI for Secure Routing in the InternetFrancesco Palmieri. 882-894 [doi]
- Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different PasswordsJeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won. 895-902 [doi]
- Timeout Estimation Using a Simulation Model for Non-repudiation ProtocolsMildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou. 903-914 [doi]
- DDoS Attack Defense Architecture Using Active Network TechnologyChoong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee. 915-923 [doi]
- A Voting System with Trusted Verifiable ServicesMacià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger. 924-937 [doi]
- Chaotic ProtocolsMohamed Mejri. 938-948 [doi]
- Security Consequences of Messaging Hubs in Many-to-Many E-procurement SolutionsEva Ponce, Alfonso Durán, Teresa Sánchez. 949-959 [doi]
- The SAC Test: A New Randomness Test, with Some Applications to PRNG AnalysisJulio César Hernández Castro, José María Sierra, André Seznec. 960-967 [doi]
- A Survey of Web Services SecurityCarlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 968-977 [doi]
- Fair Certified E-mail Protocols with Delivery Deadline AgreementYongsu Park, Yookun Cho. 978-987 [doi]
- QS-Ware: The Middleware for Providing QoS and Secure Ability to Web ServerSeung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang. 988-997 [doi]
- Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response SystemHyeong-Ju Kim, Byoung-Koo Kim, Ik-Kyun Kim. 998-1006 [doi]
- Efficient Key Distribution Protocol for Secure Multicast CommunicationBonghan Kim, Han-Jin Cho, Jae Kwang Lee. 1007-1016 [doi]
- A Bayesian Approach for Estimating Link Travel Time on Urban Arterial Road NetworkTaehyung Park, Sangkeon Lee. 1017-1015 [doi]
- Perimeter Defence Policy Model of Cascade MPLS VPN NetworksWon Shik Na, Jeom Goo Kim, Intae Ryoo. 1026-1034 [doi]
- Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical NetworksSun-Sik Roh, Su-Hyun Kim, Gwang-Hyun Kim. 1035-1043 [doi]
- Detection of Moving Objects Edges to Implement Home Security System in a Wireless EnvironmentYonghak Ahn, Kiok Ahn, Oksam Chae. 1044-1051 [doi]
- Reduction Method of Threat Phrases by Classifying AssetsTai-Hoon Kim, Dong Chun Lee. 1052-1059 [doi]
- Anomaly Detection Using Sequential Properties of Packets in Mobile EnvironmentSeong-sik Hong, Hwang-bin Ryou. 1060-1068 [doi]
- A Case Study in Applying Common Criteria to Development Process to Improve Security of Software ProductsSang-Ho Kim, Choon Seong Leem. 1069-1077 [doi]
- A New Recovery Scheme with Reverse Shared Risk Link Group in GMPLS-Based WDM NetworksHyuncheol Kim, Seong-Jin Ahn, Daeho Kim, Sunghae Kim, Jin-Wook Chung. 1078-1087 [doi]
- Real Time Estimation of Bus Arrival Time under Mobile EnvironmentTaehyung Park, Sangkeon Lee, Young-Jun Moon. 1088-1096 [doi]
- Call Tracking and Location Updating Using DHS in Mobile NetworksDong Chun Lee. 1097-1104 [doi]
- Improving TCP Performance over Mobile IPv6Young-Chul Shim, Nam-Chang Kim, Ho Seok Kang. 1105-1114 [doi]
- Design of Mobile Network Route Optimization Based on the Hierarchical AlgorithmDongkeun Lee, Keecheon Kim, Sunyoung Han. 1115-1124 [doi]
- On Algorithms for Minimum-Cost Quickest Paths with Multiple Delay-BoundsYoung-Cheol Bang, Inki Hong, Sungchang Lee, ByungJun Ahn. 1125-1133 [doi]
- A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction MechanismDae Sun Kim, Choong Seon Hong. 1134-1143 [doi]
- The Layer 2 Handoff Scheme for Mobile IP over IEEE 802.11 Wireless LANJongjin Park, Youngsong Mun. 1144-1150 [doi]
- Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast HandoHyun Gon Kim, Doo Ho Choi. 1151-1158 [doi]
- A Modified AODV Protocol with Multi-paths Considering Classes of ServicesMin-Su Kim, Ki Jin Kwon, Min Young Chung, Tae-Jin Lee, Jaehyung Park. 1159-1168 [doi]