Author of the publication

A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress).

, and . ICSSA, page 30-33. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Level Indicating Data Leakage Prevention System., , , and . KSII Trans. Internet Inf. Syst., 7 (3): 558-575 (2013)Enriching Security Education Hands-on Labs with Practical Exercises., , , , and . ICSSA, page 100-103. IEEE, (2017)A Study on SES-Based Information Security Framework for Autonomous Vehicle Controlling Environment., and . AsiaSim, volume 1636 of Communications in Computer and Information Science, page 68-73. Springer, (2021)NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack., , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 90-99. Springer, (2004)A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress)., and . ICSSA, page 30-33. IEEE, (2018)A modeling methodology for cyber-security simulation., and . WSC, page 374:1-374:2. WSC, (2012)Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction.. AIS, volume 3397 of Lecture Notes in Computer Science, page 81-89. Springer, (2004)A Study on Reflecting User Experience for Sensor-based Android IoT Services., , and . ICSSA, page 78. IEEE, (2020)Design of internal information leakage detection system considering the privacy violation., and . ICTC, page 480-481. IEEE, (2010)Security Requirement Representation Method for Confidence of Systems and Networks., , and . Int. J. Softw. Eng. Knowl. Eng., 20 (1): 49-71 (2010)