Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Eun-Gyeom Jang"'
Autor:
Won Joo Lee, Eun-Gyeom Jang
Publikováno v:
Journal of the Korea Society of Computer and Information. 21:65-72
Autor:
Yong-Rak Choi, Eun-Gyeom Jang
Publikováno v:
Journal of the Korea Society of Computer and Information. 21:31-38
Autor:
Eun-Gyeom Jang
Publikováno v:
Journal of the Korea Society of Computer and Information. 20:43-50
In order to protect important information of smart phone from these security threats, this paper has studied a mechanism for protecting information from the leakage of various information and personal information stored in the smart phone. This paper
Publikováno v:
Journal of the Korea Society of Computer and Information. 19:85-94
This paper studied the detection technique using file DNA-based behavior pattern analysis in order to minimize damage to user system by malicious programs before signature or security patch is released. The file DNA-based detection technique was appl
Publikováno v:
Journal of the Korea Society of Computer and Information. 18:125-136
In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch
Autor:
Eun-Gyeom Jang
Publikováno v:
Journal of the Korea Society of Computer and Information. 17:31-39
On rainy days, water films form on wet road surfaces and reduce the braking force of vehicles, which often ends up in accidents. For safe driving, the road information signage provides information on road and weather conditions warning drivers of wet
Autor:
Eun-Gyeom Jang
Publikováno v:
Journal of Korea Multimedia Society. 14:1020-1028
In this paper, we proposed a mechanism that prevents indiscreet use of digital contents, verifies created content's copyrights to provide services to granted user and protects digital contents by law by authenticating the original digital content whe
Autor:
Seok-Woo Nam, Eun-Gyeom Jang
Publikováno v:
Journal of the Korea Society of Computer and Information. 16:155-164
APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposu
Publikováno v:
Multimedia Tools and Applications. 57:407-422
In digital forensic, evidence images are stored on the disk by a forensic tool. However, the stored images can be damaged due to unexpected internal and external electromagnetic effects. Existing forensic tools only provide integrity and authenticity
Publikováno v:
Journal of the Korea Society of Computer and Information. 15:57-66
CAS Client personalization means to issue CAS ID or Key for CAS service, which is Core Technology for CAS operation. Protocol A.1 on TTA.KR-07.0079 XCAS, stores CAS Client personalization data from CAS server in XCAS server, and transmits the persona