IT convergence security (English)
- New search for: Chang, Hangbae
- New search for: Kim, Jongsung
- New search for: Park, Jonghyuk
- New search for: Chang, Hangbae
- New search for: Kim, Jongsung
- New search for: Park, Jonghyuk
In:
Journal of Intelligent Manufacturing
;
25
, 2
; 213-215
;
2013
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:IT convergence security
-
Contributors:
-
Published in:Journal of Intelligent Manufacturing ; 25, 2 ; 213-215
-
Publisher:
- New search for: Springer US
- New search for: Springer Science + Business Media B.V
-
Place of publication:Dordrecht [u.a.]
-
Publication date:2013
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 52.72
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 52.72 Fertigungsautomatisierung -
Source:
Table of contents – Volume 25, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 213
-
IT convergence securityChang, Hangbae / Kim, Jongsung / Park, Jonghyuk et al. | 2013
- 217
-
Construction of a secure two-factor user authentication system using fingerprint information and passwordGo, Woong / Lee, Kwangwoo / Kwak, Jin et al. | 2012
- 231
-
Content-based control of HTTPs mail for implementation of IT-convergence security environmentHong, Young Ran / Kim, Dongsoo et al. | 2012
- 241
-
A secret sharing scheme for EBTC using steganographyKim, Cheonshik / Shin, Dongkyoo / Shin, Dongil / Tso, Raylin / Yang, Chin-Nung et al. | 2012
- 251
-
Fast password recovery attack: application to APOPLiu, Fanbao / Liu, Yi / Xie, Tao / Feng, Dengguo / Feng, Yumeng et al. | 2012
- 263
-
Analyzing and comparing the AES architectures for their power consumptionDogan, Ahmet / Ors, S. Berna / Saldamli, Gokay et al. | 2012
- 273
-
Unbalanced states violates RFID privacyErguler, Imran / Anarim, Emin / Saldamli, Gokay et al. | 2012
- 283
-
Towards an accurate evaluation of quality of cloud service in service-oriented cloud computingWang, Shangguang / Liu, Zhipiao / Sun, Qibo / Zou, Hua / Yang, Fangchun et al. | 2012
- 293
-
A practical implementation of fuzzy fingerprint vault for smart cardsMoon, Daesung / Chung, Yongwha / Seo, Changho / Kim, Sung-Young / Kim, Jeong-Nyeo et al. | 2012
- 303
-
Image contrast enhancement for intelligent surveillance systems using multi-local histogram transformationKwak, Hwan-Joo / Park, Gwi-Tae et al. | 2012
- 319
-
The industrial security management model for SMBs in smart workKim, Yanghoon / Chang, Hangbae et al. | 2012
- 329
-
Test-driven forensic analysis of satellite automotive navigation systemsLim, Kyung-Soo / Lee, Changhoon / Park, Jong Hyuk / Lee, Sang-Jin et al. | 2012
- 339
-
Study on two privacy-oriented protocols for information communication systemsYoun, Taek-Young / Kim, Jongsung / Lim, Myung-Jae et al. | 2012
- 347
-
Ubiquitous-City Integrated Authentication System (UCIAS)Jang, Jae-Soo / Lim, Hyung-Min et al. | 2014
- 357
-
Information security strategies: towards an organizational multi-strategy perspectiveAhmad, Atif / Maynard, Sean B. / Park, Sangseo et al. | 2012