default search action
ICCSA 2004: Assisi, Italy
- Antonio Laganà, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, Chih Jeng Kenneth Tan, Osvaldo Gervasi:
Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I. Lecture Notes in Computer Science 3043, Springer 2004, ISBN 3-540-22054-2
Information Systems and Information Technologies (ISIT) Workshop, Multimedia Session
- Jin Ok Kim, Sung Jin Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee:
Face Detection by Facial Features with Color Images and Face Recognition Using PCA. 1-8 - Jin-Sung Yoon, Joo-Chul Park, Seok-Woo Jang, Gye-Young Kim:
A Shakable Snake for Estimation of Image Contours. 9-16 - Joong-Jae Lee, Won Kim, Jeong-Hee Cha, Gye-Young Kim, Hyung-Il Choi:
A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained Ambiguity. 17-24 - Junchul Chun, Goorack Park, Changho An:
A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Model. 25-32 - Mi-Gyung Cho, Am Sok Oh, Byung kwan Lee:
A Feature-Based Algorithm for Recognizing Gestures on Portable Computers. 33-40 - Jeong-Hee Cha, HyoJong Jang, Gye-Young Kim, Hyung-Il Choi:
Fingerprint Matching Based on Linking Information Structure of Minutiae. 41-48 - YoungSik Choi, KiJoo Kim:
Video Summarization Using Fuzzy One-Class Support Vector Machine. 49-56 - Maria Hong, Euisun Kang, Sungmin Um, Dongho Kim, Younghwan Lim:
A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminals. 57-64
Information Systems and Information Technologies (ISIT) Workshop, Algorithm Session
- Kyung-Woo Kang:
A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurg. 65-72 - Sunwoong Yang, MoonJoon Kim, JaeHeung Park, Hoon Chang:
A Study on Methodology for Enhancing Reliability of Datapath. 73-80 - Jin Kim, Dong Hoi Kim, Saangyong Uhmn:
A Useful Method for Multiple Sequence Alignment and Its Implementation. 81-88 - Yong-Wan Roh, Kwang-Seok Hong, Hyon-Gu Lee:
A Research on the Stochastic Model for Spoken Language Understanding. 89-96 - Bobby D. Gerardo, Jaewan Lee, Jung-sik Lee, Mingi Park, Malrey Lee:
The Association Rule Algorithm with Missing Data in Data Mining. 97-105 - Jang-Wu Jo, Byeong-Mo Chang:
Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow. 106-113 - Kang Soo Tae, Hee Yong Youn, Gyung-Leen Park:
On Negation-Based Conscious Agent. 114-121 - Seok-Woo Han, He-Jue Eun, Yong-Sung Kim, László T. Kóczy:
A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Document. 122-133 - Kweon Yang Kim, Byong Gul Lee, Dong Kwon Hong:
A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Features. 134-141
Information Systems and Information Technologies (ISIT) Workshop, Security Session
- Kyohyeok Kwon, Seong-Jin Ahn, Jin-Wook Chung:
Network Security Management Using ARP Spoofing. 142-149 - ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon:
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. 150-158 - Han-Ki Lee, Geun-Sil Song, Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee:
A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign. 159-166 - Il-Sun You, Kyungsan Cho:
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. 167-174 - Jung-Sun Kim, Minsoo Kim, BongNam Noh:
A Fuzzy Expert System for Network Forensics. 175-182 - Dong-Soo Kim, Tai-Myung Chung:
A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models. 183-190 - Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Jung C. Na, Tai-Myung Chung:
The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. 191-198 - Miyoung Kim, Misun Kim, Youngsong Mun:
Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP. 199-206 - Changyeol Choi, Sungsoo Kim, We-Duke Cho:
Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems. 207-214 - Soon Seok Kim, Sung Kwon Kim, Hong-Jin Park:
New Approach for Secure and Efficient Metering in the Web Advertising. 215-221 - Young-Hwan Oh, Hae-Young Bae:
MLS/SDM: Multi-level Secure Spatial Data Model. 222-229 - Jun-Hyung Park, Minsoo Kim, BongNam Noh:
Detection Techniques for ELF Executable File Using Assembly Instruction Searching. 230-237 - Hyung-Jin Lim, Hak-Ju Kim, Tae-Kyung Kim, Tai-Myung Chung:
Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain. 238-245 - Byoung-Joon Min, Sung Ki Kim, Chaetae Im:
Committing Secure Results with Replicated Servers. 246-253 - Won Goo Lee, Jae-Kwang Lee:
Applied Research of Active Network to Control Network Traffic in Virtual Battlefield. 254-261 - Miyoung Kim, Misun Kim, Youngsong Mun:
Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. 262-269
Information Systems and Information Technologies (ISIT) Workshop, Network Session
- Seokhoon Kang, Iksoo Kim, Yoseop Woo:
Analysis of Performance for MCVoD System. 270-277 - In Hwa Lee, Sung-Jo Kim:
A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow Labels. 278-285 - Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang, SangKeun Lee:
Energy-Efficient Message Management Algorithms in HMIPv6. 286-293 - Sungkeun Lee, Wongeun Oh, Myunghyun Song, Hyun Yoe, Jin-Gwang Koh, Changryul Jung:
A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved Throughput. 294-301 - Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi:
PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. 302-309 - Kwang-Ok Lee, Sang-Hyun Bae, Jin-Gwang Koh, Chang-Hee Kwon, Chong-Soo Cheung, In-Ho Ra:
Traffic Control Scheme of ABR Service Using NLMS in ATM Network. 310-318
Information Systems and Information Technologies (ISIT) Workshop, Grid Session
- Yong-won Kwon, So-Hyun Ryu, Chang-Sung Jeong, Hyoungwoo Park:
XML-Based Workflow Description Language for Grid Applications. 319-327 - Seonho Kim, Miyoun Yoon, Yongtae Shin:
Placement Algorithm of Web Server Replicas. 328-336 - Chang Yun Jeong, Yong-Sung Kim, Yan Ha:
XML-OGL: UML-Based Graphical Web Query Language for XML Documents. 337-344 - Iksoo Kim, Yoseop Woo, Hyunchul Kang, Backhyun Kim, Jinsong Ouyang:
Layered Web-Caching Technique for VOD Services. 345-351 - Dong Su Nam, Chan-Hyun Youn, Bong-Hwan Lee, Gari D. Clifford, Jennifer Healey:
QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. 352-359 - Younghun Ko, Jaehyoun Kim, Hyunseung Choo:
Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web Applications. 360-369 - Eui-nam Huh:
A New Architecture Design for Differentiated Resource Sharing on Grid Service. 370-377 - Duckki Kim, Youngsong Mun:
An Experiment and Design of Web-Based Instruction Model for Collaboration Learning. 378-385
Information Systems and Information Technologies (ISIT) Workshop, Mobile Session
- Young-Hwan You, Taewon Jang, Min-goo Kang, Hyung-Woo Lee, Hwa-Seop Lim, Yong-Soo Choi, Hyoung-Kyu Song:
Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels. 386-393 - Hyoung-Kyu Song, Min-goo Kang, Ou-Seb Lee, Pan-Yuh Joo, We-Duke Cho, Mi-Jeong Kim, Young-Hwan You:
PMEPR Reduction Algorithms for STBC-OFDM Signals. 394-401 - Jaemin Kwak, HeeGok Kang, Sung-Eon Cho, Hyun Yoe, Jin-Gwang Koh:
An Effcient Image Transmission System Adopting OFDM Based Sequence Reordering Method in Non-flat Fading Channel. 402-409 - Jong Woo Kim, Seong-Seok Park, Chang Soo Kim, Yugyung Lee:
The Efficient Web-Based Mobile GIS Service System through Reduction of Digital Map. 410-417 - Sangjoon Park, Eunjoo Jeong, Byunggi Kim:
Reducing Link Loss in Ad Hoc Networks. 418-425 - Woojin Lee, Yongsun Cho, Kiwon Chong:
A Web Based Model for Analyzing Compliance of Mobile Content. 426-433 - Kee-Hyun Choi, Kyung-Soo Jang, Dong Ryeol Shin:
Delay and Collision Reduction Mechanism for Distributed Fair Scheduling in Wireless LANs. 434-441
Approaches or Methods of Security Engineering Workshop
- Yong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee:
Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP. 442-450 - Eun-Ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung:
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. 451-460 - Haeng-Kon Kim, Tai-Hoon Kim:
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. 461-470 - Dae Hyun Yum, Pil Joong Lee:
A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. 471-480 - Sun-Myung Hwang:
A Design of Configuration Management Practices and CMPET in Common Criteria Based on Software Process Improvement Activity. 481-490 - Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee:
The Design and Development for Risk Analysis Automatic Tool. 491-499 - Kyeongmo Park:
A Fault-Tolerant Mobile Agent Model in Replicated Secure Services. 500-509 - Hyeong Seon Yoo, Dongryeol Lee:
Computation of Multiplicative Inverses in GF(2n) Using Palindromic Representation. 510-516 - Hoon-Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon:
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. 517-526 - IkSu Park, Seung Bae Park, ByeongKyun Oh:
User Authentication Protocol Based on Human Memorable Password and Using RSA. 527-536 - Ghita Kouadri Mostéfaoui, Mansoo Kim, Mokdong Chung:
Supporting Adaptive Security Levels in Heterogeneous Environments. 537-546 - Yongsu Park, Jaeheung Lee, Yookun Cho:
Intrusion Detection Using Noisy Training Data. 547-556 - Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park:
A Study on Key Recovery Agent Protection Profile Having Composition Function. 557-566 - HyungJong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho:
Simulation-Based Security Testing for Continuity of Essential Service. 567-576 - Ha Jin Hwang, Soung Won Kim:
NextPDM: Improving Productivity and Enhancing the Reusability with a Customizing Framework Toolkit. 577-586 - Hangkon Kim:
A Framework for Security Assurance in Component Based Development. 587-596 - Sangkyun Kim, Choon Seong Leem:
An Information Engineering Methodology for the Security Strategy Planning. 597-607 - Sang-ho Kim, Choon Seong Leem:
A Case Study in Applying Common Criteria to Development Process of Virtual Private Network. 608-616 - Ihn-Han Bae, Sun-Jin Oh:
A Pointer Forwarding Scheme for Fault-Tolerant Location Management in Mobile Networks. 617-624 - Ho-jun Shin, Soo-Gi Lee:
Architecture Environments for E-business Agent Based on Security. 625-634
Authentication Authorization Accounting (AAA) Workshop
- Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun:
Multi-modal Biometrics System Using Face and Signature. 635-644 - Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won:
Simple and Efficient Group Key Agreement Based on Factoring. 645-654 - Jin Ok Kim, Kyong Sok Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee:
On Facial Expression Recognition Using the Virtual Image Masking for a Security System. 655-662 - Yumi Choi, Hyunseung Choo, Byong-Lyol Lee:
Secure Handoff Based on Dual Session Keys in Mobile IP with AAA. 663-672 - Mihui Kim, Kijoon Chae:
Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. 673-682 - Eun-Jung Choi, Hyung-Jong Kim, Myuhng Joo Kim:
DMKB : A Defense Mechanism Knowledge Base. 683-692 - Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na:
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. 693-700 - HyungHyo Lee, Seungyong Lee, BongNam Noh:
A New Role-Based Authorization Model in a Corporate Workflow Systems. 701-710 - Hea Suk Jo, Hee Yong Youn:
A New Synchronization Protocol for Authentication in Wireless LAN Environment. 711-721 - Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee:
A Robust Image Authentication Method Surviving Acceptable Modifications. 722-727 - Taekyoung Kwon, Jaeil Lee:
Practical Digital Signature Generation Using Biometrics. 728-737 - Changnam Kim, Young Sin Kim, Eui-nam Huh, Youngsong Mun:
Performance Improvement in Mobile IPv6 Using AAA and Fast Handoff. 738-745 - Young Sin Kim, Eui-nam Huh, Jun Hwang, Byungwook Lee:
An Efficient Key Agreement Protocol for Secure Authentication. 746-754 - Choong Seon Hong, Joon Heo:
A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3. 755-764 - Hoseong Jeon, Hyunseung Choo, Jai-Ho Oh:
IDentification Key Based AAA Mechanism in Mobile IP Networks. 765-775 - Kiyoung Moon, Namje Park, Jongsu Jang, Sungwon Sohn, Jaecheol Ryou:
An Integrated XML Security Mechanism for Mobile Grid Application. 776-783 - Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn:
Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. 784-791 - Chi Hyung In, Choong Seon Hong, Il Gyu Song:
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment. 792-801
Internet Communication Security Workshop
- Dae Hyun Yum, Pil Joong Lee:
Generic Construction of Certificateless Encryption. 802-811 - Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda:
Security Issues in Network File Systems. 812-820 - Stefan Lindskog, Johan Strandbergh, Mikael Hackman, Erland Jonsson:
A Content-Independent Scalable Encryption Model. 821-830 - Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. 831-840 - Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. 841-850 - José María Sierra, Julio César Hernández Castro, Almudena Alcaide, Joaquín Torres Márquez:
Validating the Use of BAN LOGIC. 851-858 - L. Javier García-Villalba:
Use of Spectral Techniques in the Design of Symmetrical Cryptosystems. 859-867 - Robson de Oliveira Albuquerque, Rafael T. de Sousa Jr., Tamer Américo da Silva, Ricardo Staciarini Puttini, Cláudia J. Barenco Abbas, L. Javier García-Villalba:
Load Balancing and Survivability for Network Services Based on Intelligent Agents. 868-881 - Francesco Palmieri:
A Scalable PKI for Secure Routing in the Internet. 882-894 - Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won:
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. 895-902 - Mildrey Carbonell, Jose Antonio Onieva, Javier López, Deborah Galpert, Jianying Zhou:
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. 903-914 - Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee:
DDoS Attack Defense Architecture Using Active Network Technology. 915-923 - Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
A Voting System with Trusted Verifiable Services. 924-937 - Mohamed Mejri:
Chaotic Protocols. 938-948 - Eva Ponce, Alfonso Durán, Teresa Sánchez:
Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions. 949-959 - Julio César Hernández Castro, José María Sierra, André Seznec:
The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. 960-967 - Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
A Survey of Web Services Security. 968-977 - Yongsu Park, Yookun Cho:
Fair Certified E-mail Protocols with Delivery Deadline Agreement. 978-987
Location Management and the Security in the Next Generation Mobile Networks Workshop
- Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang:
QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. 988-997 - Hyeong-Ju Kim, Byoung-Koo Kim, Ik-Kyun Kim:
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System. 998-1006 - Bonghan Kim, Han-Jin Cho, Jae-Kwang Lee:
Efficient Key Distribution Protocol for Secure Multicast Communication. 1007-1016 - Taehyung Park, Sangkeon Lee:
A Bayesian Approach for Estimating Link Travel Time on Urban Arterial Road Network. 1017-1015 - Won Shik Na, Jeom Goo Kim, Intae Ryoo:
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. 1026-1034 - Sun-Sik Roh, Su-Hyun Kim, Gwang-Hyun Kim:
Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks. 1035-1043 - Yonghak Ahn, Kiok Ahn, Oksam Chae:
Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment. 1044-1051 - Tai-Hoon Kim, Dong Chun Lee:
Reduction Method of Threat Phrases by Classifying Assets. 1052-1059 - Seong-sik Hong, Hwang-Bin Ryou:
Anomaly Detection Using Sequential Properties of Packets in Mobile Environment. 1060-1068 - Sang-ho Kim, Choon Seong Leem:
A Case Study in Applying Common Criteria to Development Process to Improve Security of Software Products. 1069-1077 - Hyuncheol Kim, Seong-Jin Ahn, Daeho Kim, Sunghae Kim, Jin-Wook Chung:
A New Recovery Scheme with Reverse Shared Risk Link Group in GMPLS-Based WDM Networks. 1078-1087 - Taehyung Park, Sangkeon Lee, Young-Jun Moon:
Real Time Estimation of Bus Arrival Time under Mobile Environment. 1088-1096 - Dong Chun Lee:
Call Tracking and Location Updating Using DHS in Mobile Networks. 1097-1104
Routing and Handoff Workshop
- Young-Chul Shim, Nam-Chang Kim, Ho Seok Kang:
Improving TCP Performance over Mobile IPv6. 1105-1114 - Dongkeun Lee, Keecheon Kim, Sunyoung Han:
Design of Mobile Network Route Optimization Based on the Hierarchical Algorithm. 1115-1124 - Young-Cheol Bang, Inki Hong, Sungchang Lee, ByungJun Ahn:
On Algorithms for Minimum-Cost Quickest Paths with Multiple Delay-Bounds. 1125-1133 - Dae Sun Kim, Choong Seon Hong:
A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism. 1134-1143 - Jongjin Park, Youngsong Mun:
The Layer 2 Handoff Scheme for Mobile IP over IEEE 802.11 Wireless LAN. 1144-1150 - Hyun Gon Kim, Doo-Ho Choi:
Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Hando. 1151-1158 - Min-Su Kim, Ki Jin Kwon, Min Young Chung, Tae-Jin Lee, Jaehyung Park:
A Modified AODV Protocol with Multi-paths Considering Classes of Services. 1159-1168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.