Search Results - "BongNam Noh"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    The algorithm to enhance the security of multi-agent in distributed computing environment by Haeryong Park, Haksoo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh

    “…The usages of public key infrastructure (PKI) in secure e-mail service, e-commerce service, client authentication service with SSL, etc. have increased…”
    Get full text
    Conference Proceeding
  2. 2
  3. 3

    A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process by Kimoon Jeong, Junhyung Park, Minsoo Kim, Bongnam Noh

    “…The high cost for information security incident response makes organizations hesitate to possess their own expert security team. Also organizations are still…”
    Get full text
    Conference Proceeding
  4. 4

    Trends of Biometric and Test Techniques of K-NBTC by Dae Cheol Shin, Kim, J., Bongnam Noh

    “…As biometric technology spreads into a number of application areas, it is most important to promote the commercialization of the biometric system, and secure…”
    Get full text
    Conference Proceeding
  5. 5

    Robust bootstrapping memory analysis against anti-forensics by Lee, Kyoungho, Hwang, Hyunuk, Kim, Kibom, Noh, BongNam

    Published in Digital investigation (07-08-2016)
    “…Memory analysis is increasingly used to collect digital evidence in incident response. With the fast growth in memory analysis, however, anti-forensic…”
    Get full text
    Journal Article
  6. 6

    Internetworking between OSI and TCP/IP network managements with security features by Taeyeon Kim, Bongnam Noh

    “…To integrate both the OSI network and the TCP/IP internet the application gateway with powerful and flexible paradigms has been used, but micro-managements of…”
    Get full text
    Conference Proceeding
  7. 7

    Design of Context-Awareness Simulation Toolkit for Ubiquitous Computing by InSu Kim, HeeMan Park, YoungLok Lee, HyungHyo Lee, BongNam Noh

    “…The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use the context information. To…”
    Get full text
    Conference Proceeding
  8. 8

    Design and Implementation of Context-Awareness Simulation Toolkit for Context learning by InSu Kim, HeeMan Park, YoungLok Lee, SeungYong Lee, HyungHyo Lee, BongNam Noh

    “…The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use the context information. To…”
    Get full text
    Conference Proceeding