¼¼ºÎÇÁ·Î±×·¥

 

88.   79
Track>Session : Emerging Security Issues > Secure Coding
¹ßÇ¥Á¦¸ñ : Secure Coding Guidelines in Korea
¹ßÇ¥ÀÚ : ÇѱÙÈñ (Àü¹®À§¿ø(¼­±â°ü)/ÇàÁ¤¾ÈÀüºÎ)
°­¿¬¿ä¾à : ¡Û °¢ ±â°ü¿¡¼­ Á¤º¸½Ã½ºÅÛÀ̳ª Á¤º¸¼­ºñ½º¸¦ Á¦°øÇϱâ À§ÇØ ¼ÒÇÁÆ®¿þ¾î¸¦ °³¹ßÇÏ´Â °úÁ¤¿¡¼­ ±â ȹ ´Ü°èºÎÅÍ ½ÇÁ¦ ¼­ºñ½º¸¦ Á¦°øÇÏ´Â ¿î¿µ•À¯Áöº¸¼ö ´Ü°è±îÁö Àüü °úÁ¤...
Track>Session : Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ : Device Authentication and More Security: Mobile TPM
¹ßÇ¥ÀÚ : ¹ÚÇöÁÖ (´ëÇ¥ÀÌ»ç/¿¥Å¥¸¯½º)
°­¿¬¿ä¾à : ÇöÀç ±¹³»ÀÇ µð¹ÙÀ̽ºÀÎÁõ¿¡ ´ëÇÑ °³³äÀº ¸Å¿ì ´Ù¾çÇÑ °¡¿îµ¥, Çà¾ÈºÎ¸¦ Áß½ÉÀ¸·Î ÃßÁøÇØ¿Â ±â±âÀÎ Áõ ¹× CCTC, ÀÎÅͳÝÆù Àû¿ëÀ¸·Î ±× ±â¼ú°ú ¼­ºñ½º°¡ Á¤¸³µÇ·ÁÇÏ°í ÀÖÀ¸³ª, ...
Track>Session : Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ : Smart Phone Security
¹ßÇ¥ÀÚ : ±è±â¿µ (Ã¥ÀÓ/ETRI)
°­¿¬¿ä¾à : ½ÃÀåÁ¶»ç±â°üÀÎ IDC¿¡ ÀÇÇϸé 2013³â±îÁö Àü¼¼°èÀûÀ¸·Î ½º¸¶Æ®Æù ÆǸŷ®Àº 40%¸¦ Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹»óÇÏ°í ÀÖ°í, ±¹³» ½º¸¶Æ®Æù ÆǸŷ®(¡®10³â 1¿ù 100¸¸, ¡®5¿ù 185¸¸¡¯ µî)Àº...
Track>Session : Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ : WiFi and FMC Service Security
¹ßÇ¥ÀÚ : ±èȯ±¹ (Ã¥ÀÓ/KISA)
°­¿¬¿ä¾à : FMC(Fixed/Mobile Convergence)´Â ÀÌÅë¸Á°ú À¯¼± ÀÎÅͳݸÁÀÌ ÅëÇÕµÈ À¯¹«¼± ÅëÇÕ È¯°æÀ¸·Î¼­ ±¹³»¿¡ ¼­´Â ÇϳªÀÇ ÈÞ´ëÆùÀ¸·Î ¿ÜºÎ¿¡¼­´Â ÀÌÅë¸ÁÀ¸·Î, Wi-FI°¡ ¼³Ä¡µÈ °÷¿¡¼­´Â ...
Track>Session : Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ : Practical AMI(Advanced Metering Infrastructure) Security
¹ßÇ¥ÀÚ : ³ªÁßÂù (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : The purpose of this presentation is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to secure that implemen...
Track>Session : Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ : Security Requirement in Cloud Computing
¹ßÇ¥ÀÚ : ±èÁÖ¿µ (ÆÀÀå/KISA)
°­¿¬¿ä¾à : Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼­ÀÇ Áß¿ä À̽´´Â ¼­ºñ½º ¾ÈÁ¤È­, ½ÃÅ¥¸®Æ¼, ¹ý Àû¿ë ¹®Á¦ µîÀÌ¸ç ±âÁ¸ µ¥ÀÌÅÍ ¼¾ ÅÍÀÇ Ãë¾àÁ¡°ú Ŭ¶ó¿ìµå ÄÄÇ»Æà µ¥ÀÌÅÍ ¼¾Å͵µ À¯»çÇÏ´Ù. ±×·¯³ª Ŭ¶ó¿ìµå ...
Track>Session : Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ : Security Implementation using Virtualization Technology
¹ßÇ¥ÀÚ : ±è±â¿µ (»ó¹«ÀÌ»ç/ÀÌ´ÏÅØ)
°­¿¬¿ä¾à : °¡»óÈ­ ±â¼úÀÇ ¼º¼÷µµ°¡ ³ô¾ÆÁü¿¡ µû¶ó ´Ù¾çÇÑ ºÐ¾ß¿¡¼­ °¡»óÈ­ ±â¼úÀ» ÀÌ¿ëÇÏ¿© º¸¾ÈÀ» °­È­ÇÏ·Á ´Â ¿òÁ÷ÀÓÀÌ ÀÖ´Ù. °¡»óÈ­°¡ º¸¾È°­È­¸¦ À§ÇÏ¿© »ç¿ëµÇ´Â »ç·Ê¸¦ °ËÅäÇØ º¸°í...
Track>Session : Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ : Dependable Wireless Networks
¹ßÇ¥ÀÚ : ¿°ÀÍÁØ (±³¼ö/¼º±Õ°ü´ëÇб³)
°­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â ¹«¼± ³×Æ®¿öÅ©ÀÇ ½Å·Ú¼º ¹®Á¦¸¦ ´Ù·é´Ù. ¹«¼± ³×Æ®¿öÅ©´Â ³×Æ®¿öÅ© ¸µÅ©°¡ °³¹æµÇ ¾î Àִ Ư¼ºÀ¸·Î ÀÎÇØ, À̱âÀûÀΠȤÀº ¾ÇÀÇÀûÀÎ »ç¿ëÀÚ¿¡ ÀÇÇØ ½±°Ô °ø°Ý´ç ...
Track>Session : Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ : Exploiting Capture Effect for Performance Enhancement in Wireless Networks
¹ßÇ¥ÀÚ : ¹é»óÇå (±³¼ö/°í·Á´ëÇб³)
°­¿¬¿ä¾à : Capture Effect´Â ¹«¼± ³×Æ®¿öÅ©¿¡¼­ µÎ °³ ÀÌ»óÀÇ ÆÐŶÀÌ µ¿½Ã¿¡ Àü¼ÛµÇ¾î ½ÅÈ£°¡ ÁßøµÇ´õ¶óµµ ¼ö ½Å ½Ã°£ ¹× ¼ö½Å °¨µµ¿¡ µû¶ó ÆÐŶÀ» ¿Ã¹Ù¸£°Ô ¼ö½ÅÇÒ ¼ö Àִ Ư¼ºÀ» ¸»ÇÑ...
Track>Session : Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ : Capacity and Delay of Wireless Networks: Controllable Mobility Perspective
¹ßÇ¥ÀÚ : ±è¼º·û (±³¼ö/¿¬¼¼´ëÇб³)
°­¿¬¿ä¾à : À̵¿¼º ÁöÇâÀÇ ¹«¼±Åë½Å ³×Æ®¿öÅ©¿¡¼­ ³ëµå°£ Capacity (Transport vs. Transmission) ¹× Delay ÃÖÀûÈ­ ¸¦ À§Çؼ­ À̵¿¼º (Node mobility)¸¦ ¾î¶»°Ô È°¿ëÇØ¾ß ÇÏ´Â Áö¸¦ ¼Ò°³ÇÑ...
 01 02 03 04 05 06 07 08 09