Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Yong Rak Choi"'
Autor:
Jae-Min Eum, Eun-Ji Kim, Dae-Su Kim, Su-Hwan Go, Yeon-Gyeong Chae, Dong-Gyu Lee, Seung Il Kim, Yong Rak Choi, Wonjae Choi, Jong Moon Ha, Hong Min Seung, Sahn Nahm
Publikováno v:
Ceramics International. 49:7556-7565
Autor:
Yong-Rak Choi, Eun-Gyeom Jang
Publikováno v:
Journal of the Korea Society of Computer and Information. 21:31-38
Publikováno v:
International Journal of Security and Its Applications. 10:247-254
Publikováno v:
Macromolecular Research. 23:1068-1072
Fully printed organic photovoltaic (OPV) devices were fabricated using slot die coating, electro-spraying, and screen printing technologies. A fundamental study was performed to fabricate the organic photovoltaic device with the functional layers. In
Publikováno v:
International Journal of Multimedia and Ubiquitous Engineering. 9:443-452
In order to preserve important data including a company’s intellectual properties which require security or deserve to be archives, we generally do it electronically in disk mirroring, also known as RAID, or external storage devices. Digitized data
Publikováno v:
Multimedia Tools and Applications. 57:407-422
In digital forensic, evidence images are stored on the disk by a forensic tool. However, the stored images can be damaged due to unexpected internal and external electromagnetic effects. Existing forensic tools only provide integrity and authenticity
Publikováno v:
Journal of the Korea Society of Computer and Information. 15:57-66
CAS Client personalization means to issue CAS ID or Key for CAS service, which is Core Technology for CAS operation. Protocol A.1 on TTA.KR-07.0079 XCAS, stores CAS Client personalization data from CAS server in XCAS server, and transmits the persona
Autor:
Yong Rak Choi, Soo Jin Park
Publikováno v:
The KIPS Transactions:PartC. :719-724
Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it i
Publikováno v:
2008 International Conference on Information Security and Assurance (isa 2008).
Digital content services in pervasive computing environment provide a vast range of information and rapidly. However, in this environment where various information flow the copyright infringement problems such as modification and fraudulent use of di
Publikováno v:
ICNC (5)
In Ubiquitous Computing Environment (UCE), volatile information such as register, cache memory, and network information are hard to make certain of a real-time collection because such volatile information are easily modified or disappeared. Thus, a c