¼¼ºÎÇÁ·Î±×·¥

 

74.   88
Track>Session : Security/Privacy > Privacy Protection & Forensics
¹ßÇ¥Á¦¸ñ : Digital Forensics Technologies
¹ßÇ¥ÀÚ : È«µµ¿ø (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : Á¤º¸È­¿¡ µû¸¥ ÄÄÇ»ÅÍ °ü·Ã ¹üÁ˻Ӹ¸ ¾Æ´Ï¶ó ÀÏ¹Ý ¹üÁË¿¡¼­µµ Áß¿ä Áõ°Å ¶Ç´Â ´Ü¼­°¡ ÄÄÇ»Å͸¦ Æ÷ÇÔ ÇÑ ´Ù¾çÇÑ ÀüÀÚ ¸Åü ³»¿¡ º¸°üµÇ¾î ÀÖ´Â °æ¿ì°¡ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ·¯ÇÑ Çö...
Track>Session : Security/Privacy > Privacy Protection & Forensics
¹ßÇ¥Á¦¸ñ : Technology for Privacy Protection and Strong Anonimity
¹ßÇ¥ÀÚ : ¾ç´ëÇå (Á¶±³¼ö/ÀÎÇÏ´ë)
°­¿¬¿ä¾à : ÇÁ¶óÀ̹ö½Ã º¸È£¸¦ À§ÇÑ ÀÍ¸í ±â¼úµé¿¡ ´ëÇÑ ÃÖ±ÙÀÇ ¿¬±¸°á°úµéÀ» °£·«ÇÏ°Ô Á¤¸®Çغ»´Ù. ±×¸®°í, VoI P Æ®·¡ÇÈÀ» ÃßÀûÇÏ´Â ±â¼ú°ú ÀÎÅͳݿ¡¼­ À͸í À¥ºê¶ó¿ì¡À» Á¦°øÇÏ´Â TOR ...
Track>Session : Security/Privacy > Privacy Protection & Forensics
¹ßÇ¥Á¦¸ñ : Digital Identity Management Technology
¹ßÇ¥ÀÚ : Áø½ÂÇå (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : ÀÎÅͳÝÀÇ È®»ê°ú ¹ßÀü¿¡ µû¶ó ÀÎÅÍ³Ý ÀüÀÚ»ó°Å·¡, ÀüÀÚÁ¤ºÎ, ÀüÀÚÀÇ·á µî°ú °°Àº ´Ù¾çÇÑ ÀüÀÚ°Å·¡°¡ È°¼ºÈ­µÇ°í ÀÖ´Ù. ±×·¯³ª ÇöÀç ÀÌ¿ëÇÏ´Â ¼­ºñ½ºÀÇ Áõ°¡·Î »ç¿ëÀÚ°¡ º¸À¯ÇÏ...
Track>Session : Tutorial: Network Practice II > Tutorial(9:30-11:30,13:00-17:00(6½Ã°£))
¹ßÇ¥Á¦¸ñ : How to Use NS2
¹ßÇ¥ÀÚ : À¯ÀçÇÊ (°­ÀDZ³¼ö/°Ç±¹´ë)
°­¿¬¿ä¾à : »õ·Î¿î ³×Æ®¿öÅ© ÇÁ·ÎÅäÄÝÀ» µðÀÚÀÎÇÏ°Ô µÇ¸é ÇÁ·ÎÅäÄÝÀÇ ¿ÏÀü¼º ¹× ¼º´ÉÀ» È®ÀÎÇØ¾ß ÇÒ Çʿ伺ÀÌ »ý±ä´Ù. À̶§ ºñ¿ë ¹× ½Ã°£ÀûÀÎ ¹®Á¦¸¦ ÇØ°áÇϱâ À§Çؼ­ ÀϹÝÀûÀ¸·Î ºÐ¼® ¸ð...
 01 02 03 04 05 06 07 08