KR20080079762A
|
|
A security authentication method of digital contents using the security agent and hash-chain and session key in wired/wireless networks
|
KR20080079767A
|
|
A standardization system and method of event types in real time cyber threat with large networks
|
KR20080069727A
|
|
A transmission method of digital contents based on public key
|
KR20080069322A
|
|
A network traffic analysis and monitoring method based on attack knowledge
|
KR20080065712A
|
|
Remote control method of computer using portable memory device
|
KR20080066102A
|
|
Military supplies management system using rfid and wireless network
|
KR20080061501A
|
|
Web history archive system and method for web pages management
|
KR20070026285A
|
|
Electronic signature identification trnasfer method that uses cellular phone channel(sms) in p2p network
|
KR20080060564A
|
|
A system of pos for electronic tag in military supplies management and a method thereof
|
KR20080059934A
|
|
A thread management method and system of the server using non-blocking input and output
|
KR20070007751A
|
|
A system for xml digital signature and a method thereof on mobile environment
|
KR20070082313A
|
|
A transitive signature scheme based on rsa-based security assumptions
|
KR100729268B1
|
|
A rotation invariant face detection method using sub-window rotation in adaboosting algorithm
|
KR100729265B1
|
|
A face detection method using difference image and color information
|
KR20070076343A
|
|
Log Analysis and Audit Method for Authentication Server and Security System in Grid Environment
|
KR20070076342A
|
|
User Group Role / Permission Management System and Access Control Methods in a Grid Environment
|
KR20070070566A
|
|
Intrusion detection data for management method
|
KR20070067324A
|
|
Limited verifier signature method from bilinear pairings
|
KR100718687B1
|
|
Id-based threshold signature scheme from bilinear pairings
|
KR100653122B1
|
|
Real-time detection system and method based rule for safety software development
|