¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
ÀÎÅÍ³Ý Å° °ü¸® ÇÁ·ÎÅäÄÝ¿¡ °üÇÑ ¿¬±¸
A study on the key management protocols for the Internet
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C - ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ (2003³â 4¿ù)
SVM ºÐ·ù ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ ½ºÆÔ¸ÞÀÏ ÇÊÅ͸µ
Spam-mail Filtering Using SVM Classifier
Á¤º¸°úÇÐȸ 2003Ãá°è (2003³â 04¿ù)
°ø°³Å° ¾ÏÈ£ ±â¹ýÀ» ÀÌ¿ëÇÑ Æнº¿öµå ±â¹ÝÀÇ ¿ø°Å¸® »ç¿ëÀÚ ÀÎÁõ ÇÁ·ÎÅäÄÝ
Password-Based Authentication Protocol for Remote Access using Public Key Cryptography
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö I - Á¤º¸Åë½Å (2003³â 02¿ù)
ŸÀÎÀÇ °üÂû¿¡ ÀÇÇÑ Æнº¿öµå ³ëÃâ·ÎºÎÅÍ ¾ÈÀüÇÑ Æнº¿öµå ½Ã½ºÅÛ
Secure Password System against Imposter
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2003³â 04¿ù)
½Ã¸àƽ À¥»óÀÇ RDF µ¥ÀÌÅÍ °ü¸® ½Ã½ºÅÛ
An RDF Data Management System On The Semantic Web
Á¤º¸°úÇÐȸ 2003Ãá°è (2003³â 04¿ù)
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2002³â 09¿ù)
IPSec¿¡¼ Å° º¹±¸ ±â¼úÀ» Àû¿ëÇÑ È¿À²ÀûÀÎ ¿¬°á °ü¸® ¸ÞÄ¿´ÏÁò
Efficient Session Management mechanism applied Key Recovery technique in IPSec
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2001³â12¿ù)
±×¸®µå ÄÄÇ»Æà (Grid Computing)
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2003³â 01¿ù)
2000³â ÃáÃß°èÇмú´ëȸ (SIGDB-KISS) (2002³â 11¿ù)
¾Öµå Ȥ ³×Æ®¿öÅ©¿¡¼ ºÎÇÏ ±ÕµîÀ» °í·ÁÇÑ ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
A Load-balancing Routing Protocol in Ad Hoc Networks
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö I - Á¤º¸Åë½Å (2003³â04¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.