¼¼ºÎÇÁ·Î±×·¥
88
.
7
9
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track>Session :
Emerging Security Issues > Secure Coding
¹ßÇ¥Á¦¸ñ :
Secure Coding Guidelines in Korea
¹ßÇ¥ÀÚ :
ÇѱÙÈñ (Àü¹®À§¿ø(¼±â°ü)/ÇàÁ¤¾ÈÀüºÎ)
°¿¬¿ä¾à :
¡Û °¢ ±â°ü¿¡¼ Á¤º¸½Ã½ºÅÛÀ̳ª Á¤º¸¼ºñ½º¸¦ Á¦°øÇϱâ À§ÇØ ¼ÒÇÁÆ®¿þ¾î¸¦ °³¹ßÇÏ´Â °úÁ¤¿¡¼ ±â ȹ ´Ü°èºÎÅÍ ½ÇÁ¦ ¼ºñ½º¸¦ Á¦°øÇÏ´Â ¿î¿µ•À¯Áöº¸¼ö ´Ü°è±îÁö Àüü °úÁ¤...
Track>Session :
Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ :
Device Authentication and More Security: Mobile TPM
¹ßÇ¥ÀÚ :
¹ÚÇöÁÖ (´ëÇ¥ÀÌ»ç/¿¥Å¥¸¯½º)
°¿¬¿ä¾à :
ÇöÀç ±¹³»ÀÇ µð¹ÙÀ̽ºÀÎÁõ¿¡ ´ëÇÑ °³³äÀº ¸Å¿ì ´Ù¾çÇÑ °¡¿îµ¥, Çà¾ÈºÎ¸¦ Áß½ÉÀ¸·Î ÃßÁøÇØ¿Â ±â±âÀÎ Áõ ¹× CCTC, ÀÎÅͳÝÆù Àû¿ëÀ¸·Î ±× ±â¼ú°ú ¼ºñ½º°¡ Á¤¸³µÇ·ÁÇÏ°í ÀÖÀ¸³ª, ...
Track>Session :
Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ :
Smart Phone Security
¹ßÇ¥ÀÚ :
±è±â¿µ (Ã¥ÀÓ/ETRI)
°¿¬¿ä¾à :
½ÃÀåÁ¶»ç±â°üÀÎ IDC¿¡ ÀÇÇϸé 2013³â±îÁö Àü¼¼°èÀûÀ¸·Î ½º¸¶Æ®Æù ÆǸŷ®Àº 40%¸¦ Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹»óÇÏ°í ÀÖ°í, ±¹³» ½º¸¶Æ®Æù ÆǸŷ®(¡®10³â 1¿ù 100¸¸, ¡®5¿ù 185¸¸¡¯ µî)Àº...
Track>Session :
Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ :
WiFi and FMC Service Security
¹ßÇ¥ÀÚ :
±èȯ±¹ (Ã¥ÀÓ/KISA)
°¿¬¿ä¾à :
FMC(Fixed/Mobile Convergence)´Â ÀÌÅë¸Á°ú À¯¼± ÀÎÅͳݸÁÀÌ ÅëÇÕµÈ À¯¹«¼± ÅëÇÕ È¯°æÀ¸·Î¼ ±¹³»¿¡ ¼´Â ÇϳªÀÇ ÈÞ´ëÆùÀ¸·Î ¿ÜºÎ¿¡¼´Â ÀÌÅë¸ÁÀ¸·Î, Wi-FI°¡ ¼³Ä¡µÈ °÷¿¡¼´Â ...
Track>Session :
Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ :
Practical AMI(Advanced Metering Infrastructure) Security
¹ßÇ¥ÀÚ :
³ªÁßÂù (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
The purpose of this presentation is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to secure that implemen...
Track>Session :
Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ :
Security Requirement in Cloud Computing
¹ßÇ¥ÀÚ :
±èÁÖ¿µ (ÆÀÀå/KISA)
°¿¬¿ä¾à :
Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼ÀÇ Áß¿ä À̽´´Â ¼ºñ½º ¾ÈÁ¤È, ½ÃÅ¥¸®Æ¼, ¹ý Àû¿ë ¹®Á¦ µîÀÌ¸ç ±âÁ¸ µ¥ÀÌÅÍ ¼¾ ÅÍÀÇ Ãë¾àÁ¡°ú Ŭ¶ó¿ìµå ÄÄÇ»Æà µ¥ÀÌÅÍ ¼¾Å͵µ À¯»çÇÏ´Ù. ±×·¯³ª Ŭ¶ó¿ìµå ...
Track>Session :
Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ :
Security Implementation using Virtualization Technology
¹ßÇ¥ÀÚ :
±è±â¿µ (»ó¹«ÀÌ»ç/ÀÌ´ÏÅØ)
°¿¬¿ä¾à :
°¡»óÈ ±â¼úÀÇ ¼º¼÷µµ°¡ ³ô¾ÆÁü¿¡ µû¶ó ´Ù¾çÇÑ ºÐ¾ß¿¡¼ °¡»óÈ ±â¼úÀ» ÀÌ¿ëÇÏ¿© º¸¾ÈÀ» °ÈÇÏ·Á ´Â ¿òÁ÷ÀÓÀÌ ÀÖ´Ù. °¡»óÈ°¡ º¸¾È°È¸¦ À§ÇÏ¿© »ç¿ëµÇ´Â »ç·Ê¸¦ °ËÅäÇØ º¸°í...
Track>Session :
Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ :
Dependable Wireless Networks
¹ßÇ¥ÀÚ :
¿°ÀÍÁØ (±³¼ö/¼º±Õ°ü´ëÇб³)
°¿¬¿ä¾à :
º» °¿¬¿¡¼´Â ¹«¼± ³×Æ®¿öÅ©ÀÇ ½Å·Ú¼º ¹®Á¦¸¦ ´Ù·é´Ù. ¹«¼± ³×Æ®¿öÅ©´Â ³×Æ®¿öÅ© ¸µÅ©°¡ °³¹æµÇ ¾î Àִ Ư¼ºÀ¸·Î ÀÎÇØ, À̱âÀûÀΠȤÀº ¾ÇÀÇÀûÀÎ »ç¿ëÀÚ¿¡ ÀÇÇØ ½±°Ô °ø°Ý´ç ...
Track>Session :
Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ :
Exploiting Capture Effect for Performance Enhancement in Wireless Networks
¹ßÇ¥ÀÚ :
¹é»óÇå (±³¼ö/°í·Á´ëÇб³)
°¿¬¿ä¾à :
Capture Effect´Â ¹«¼± ³×Æ®¿öÅ©¿¡¼ µÎ °³ ÀÌ»óÀÇ ÆÐŶÀÌ µ¿½Ã¿¡ Àü¼ÛµÇ¾î ½ÅÈ£°¡ ÁßøµÇ´õ¶óµµ ¼ö ½Å ½Ã°£ ¹× ¼ö½Å °¨µµ¿¡ µû¶ó ÆÐŶÀ» ¿Ã¹Ù¸£°Ô ¼ö½ÅÇÒ ¼ö Àִ Ư¼ºÀ» ¸»ÇÑ...
Track>Session :
Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ :
Capacity and Delay of Wireless Networks: Controllable Mobility Perspective
¹ßÇ¥ÀÚ :
±è¼º·û (±³¼ö/¿¬¼¼´ëÇб³)
°¿¬¿ä¾à :
À̵¿¼º ÁöÇâÀÇ ¹«¼±Åë½Å ³×Æ®¿öÅ©¿¡¼ ³ëµå°£ Capacity (Transport vs. Transmission) ¹× Delay ÃÖÀûÈ ¸¦ À§Çؼ À̵¿¼º (Node mobility)¸¦ ¾î¶»°Ô È°¿ëÇØ¾ß ÇÏ´Â Áö¸¦ ¼Ò°³ÇÑ...
01
02
03
04
05
06
07
08
09