-
2
-
-
77955860747
-
The importance of corporate forensic readiness in the information security framework
-
Pangalos, G., et al. The Importance of Corporate Forensic Readiness in the information security framework. In: 2010 Workshops on Enabling Technologies (2010
-
(2010)
2010 Workshops on Enabling Technologies
-
-
Pangalos, G.1
-
3
-
-
84893108391
-
-
Zero-day attack, https://en.wikipedia.org/wiki/Zero-day-attack
-
Zero-day attack
-
-
-
4
-
-
84995278052
-
-
Rootkit, http://en.wikipedia.org/wiki/Rootkit
-
Rootkit
-
-
-
7
-
-
33745653332
-
Wipi mobile platform with secure service for mobile rfid network environment
-
Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds. Springer, Heidelberg
-
Park, N., Kwak, J., Kim, S., Won, D., Kim, H. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741-748. Springer, Heidelberg (2006
-
(2006)
APWeb Workshops 2006. LNCS
, vol.3842
, pp. 741-748
-
-
Park, N.1
Kwak, J.2
Kim, S.3
Won, D.4
Kim, H.5
-
8
-
-
78649423092
-
Security scheme for managing a large quantity of individual information in RFID environment
-
Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds. Springer, Heidelberg
-
Park, N. Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72-79. Springer, Heidelberg (2010
-
(2010)
ICICA 2010. CCIS
, vol.106
, pp. 72-79
-
-
Park, N.1
-
9
-
-
80053072404
-
Secure uhf/hf dual-band rfid: Strategic framework approaches and application solutions
-
Jȩdrzejowicz, P., Nguyen, N.T., Hoang, K. (eds. Springer, Heidelberg
-
Park, N. Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jȩdrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488-496. Springer, Heidelberg (2011
-
(2011)
ICCCI 2011, Part I. LNCS
, vol.6922
, pp. 488-496
-
-
Park, N.1
-
10
-
-
80053074547
-
Implementation of terminal middleware platform for mobile rfid computing
-
Park, N. Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205-219 (2011
-
(2011)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.8
, Issue.4
, pp. 205-219
-
-
Park, N.1
-
11
-
-
78649572669
-
Harmful adult multimedia contents filtering method in mobile rfid service environment
-
Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds. Springer, Heidelberg
-
Park, N., Kim, Y. Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193-202. Springer, Heidelberg (2010
-
(2010)
ICCCI 2010, Part II. LNCS (LNAI
, vol.6422
, pp. 193-202
-
-
Park, N.1
Kim, Y.2
-
12
-
-
78649566523
-
Aont encryption based application data management in mobile rfid environment
-
Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds. Springer, Heidelberg
-
Park, N., Song, Y. AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142-152. Springer, Heidelberg (2010
-
(2010)
ICCCI 2010, Part II. LNCS (LNAI
, vol.6422
, pp. 142-152
-
-
Park, N.1
Song, Y.2
-
13
-
-
80053458971
-
Customized healthcare infrastructure using privacy weight level based on smart device
-
Lee, G., Howard, D., Ślȩzak, D. (eds. Springer, Heidelberg
-
Park, N. Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślȩzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467-474. Springer, Heidelberg (2011
-
(2011)
ICHIT 2011. CCIS
, vol.206
, pp. 467-474
-
-
Park, N.1
-
14
-
-
80052330084
-
Secure data access control scheme using type-based re-encryption in cloud environment
-
Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds. Springer, Heidelberg
-
Park, N. Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319-327. Springer, Heidelberg (2011
-
(2011)
Semantic Methods. SCI
, vol.381
, pp. 319-327
-
-
Park, N.1
-
15
-
-
79960965290
-
Enterprise data loss prevention system having a function of coping with civil suits
-
Lee, R. (ed. Springer, Heidelberg
-
Kim, Y., Park, N., Hong, D. Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers,Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201-208. Springer, Heidelberg (2011
-
(2011)
Computers,Networks, Systems, and Industrial Engineering 2011. SCI
, vol.365
, pp. 201-208
-
-
Kim, Y.1
Park, N.2
Hong, D.3
-
16
-
-
50249112176
-
Privacy-enhanced adult certification method for multimediacontents on mobile rfid environments
-
IEEE, Los Alamitos
-
Kim, Y., Park, N., Won, D. Privacy-Enhanced Adult Certification Method for MultimediaContents on Mobile RFID Environments. In: Proc. of IEEE International Symposium onConsumer Electronics, pp. 1-4. IEEE, Los Alamitos (2007
-
(2007)
Proc. of IEEE International Symposium onConsumer Electronics
, pp. 1-4
-
-
Kim, Y.1
Park, N.2
Won, D.3
-
17
-
-
78649583760
-
Adult certification system on mobile rfid serviceenvironments
-
Kim, Y., Park, N., Hong, D., Won, D. Adult Certification System on Mobile RFID ServiceEnvironments. Journal of Korea Contents Association 9(1), 131-138 (2009
-
(2009)
Journal of Korea Contents Association
, vol.9
, Issue.1
, pp. 131-138
-
-
Kim, Y.1
Park, N.2
Hong, D.3
Won, D.4
-
18
-
-
77958482600
-
Secure rfid application data management using all-or-nothing transform encryption
-
Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds. Springer, Heidelberg
-
Park, N., Song, Y. Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245-252. Springer, Heidelberg (2010
-
(2010)
WASA 2010. LNCS
, vol.6221
, pp. 245-252
-
-
Park, N.1
Song, Y.2
-
19
-
-
84865983605
-
The implementation of open embedded s/w platform for secure mobile rfid reader
-
Park, N. The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785-793 (2010
-
(2010)
The Journal of Korea Information and Communications Society
, vol.35
, Issue.5
, pp. 785-793
-
-
Park, N.1
-
20
-
-
84865969179
-
Mobile rfid/nfc linkage based on uhf/hf dual band?s integration in u-sensor network era
-
Park, J.J. (J.H.), Kim, J., Zou, D., Lee, Y.S. (eds. Springer, Heidelberg
-
Park, N. Mobile RFID/NFC Linkage Based on UHF/HF Dual Band?s Integration in U-Sensor Network Era. In: Park, J.J. (J.H.), Kim, J., Zou, D., Lee, Y.S. (eds.) ITCS & STA 2012. LNEE, vol. 180, pp. 265-271. Springer, Heidelberg (2012
-
(2012)
ITCS & STA 2012. LNEE
, vol.180
, pp. 265-271
-
-
Park, N.1
-
21
-
-
80052330084
-
Secure data access control scheme using type-based re-encryption in cloud environment
-
Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds. Springer, Heidelberg
-
Park, N. Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319-327. Springer, Heidelberg (2011
-
(2011)
Semantic Methods. SCI
, vol.381
, pp. 319-327
-
-
Park, N.1
|