¼¼ºÎÇÁ·Î±×·¥

 

88.   79
Track > Session : Emerging Security Issues > Secure Coding
¹ßÇ¥Á¦¸ñ : Secure Coding Guidelines in Korea
¹ßÇ¥ÀÚ : ÇѱÙÈñ (Àü¹®À§¿ø(¼­±â°ü)/ÇàÁ¤¾ÈÀüºÎ)
°­¿¬¿ä¾à : ¡Û °¢ ±â°ü¿¡¼­ Á¤º¸½Ã½ºÅÛÀ̳ª Á¤º¸¼­ºñ½º¸¦ Á¦°øÇϱâ À§ÇØ ¼ÒÇÁÆ®¿þ¾î¸¦ °³¹ßÇÏ´Â °úÁ¤¿¡¼­ ±â ȹ ´Ü°èºÎÅÍ ½ÇÁ¦ ¼­ºñ½º¸¦ Á¦°øÇÏ´Â ¿î¿µ•À¯Áöº¸¼ö ´Ü°è±îÁö Àüü °úÁ¤»ó¿¡¼­ ÇÁ·Î±×·¡¹ÖÀ» À߸ø ÇÏ¿© ¸¸µé¾îÁö´Â Ãë¾à¼º(¿À·ù•°áÁ¡•°áÇÔ•º¸¾ÈÃë¾àÁ¡)À» »çÀü¿¡ ã¾Æ¼­ Á¦°ÅÇÏ´Â ÀÛ¾÷À» ¼öÇàÇÏ´Â ...more
Track > Session : Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ : Device Authentication and More Security: Mobile TPM
¹ßÇ¥ÀÚ : ¹ÚÇöÁÖ (´ëÇ¥ÀÌ»ç/¿¥Å¥¸¯½º)
°­¿¬¿ä¾à : ÇöÀç ±¹³»ÀÇ µð¹ÙÀ̽ºÀÎÁõ¿¡ ´ëÇÑ °³³äÀº ¸Å¿ì ´Ù¾çÇÑ °¡¿îµ¥, Çà¾ÈºÎ¸¦ Áß½ÉÀ¸·Î ÃßÁøÇØ¿Â ±â±âÀÎ Áõ ¹× CCTC, ÀÎÅͳÝÆù Àû¿ëÀ¸·Î ±× ±â¼ú°ú ¼­ºñ½º°¡ Á¤¸³µÇ·ÁÇÏ°í ÀÖÀ¸³ª, ÃÖ±Ù º¸¾È±â¼úÀº ½º¸¶Æ® Æù, ½º¸¶Æ®±×¸®µåµîÀÇ ITȯ°æÀÌ ±Þº¯ÇÏ¸ç µð¹ÙÀ̽ºÀÎÁõ¿¡ ´ëÇÑ Àû¿ëÀÎÇÁ¶ó, Àû¿ëµð¹ÙÀ̽º, Àû¿ë¼­ ºñ½º°¡ ´Þ¸® ¿ä±¸µÇ...more
Track > Session : Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ : Smart Phone Security
¹ßÇ¥ÀÚ : ±è±â¿µ (Ã¥ÀÓ/ETRI)
°­¿¬¿ä¾à : ½ÃÀåÁ¶»ç±â°üÀÎ IDC¿¡ ÀÇÇϸé 2013³â±îÁö Àü¼¼°èÀûÀ¸·Î ½º¸¶Æ®Æù ÆǸŷ®Àº 40%¸¦ Â÷ÁöÇÒ °ÍÀ¸·Î ¿¹»óÇÏ°í ÀÖ°í, ±¹³» ½º¸¶Æ®Æù ÆǸŷ®(¡®10³â 1¿ù 100¸¸, ¡®5¿ù 185¸¸¡¯ µî)Àº ¿¹ÃøÇϱ⠾î·Á¿ï Á¤µµ·Î ±Þ¼ÓÇÑ ¼Óµµ·Î Áõ°¡ÇÏ°í ÀÖ¾î ½º¸¶Æ®Æù ½ÃÀåÀÇ Æø¹ßÀûÀÎ ¼ºÀåÀÌ ±âÁ¤»ç½Ç·Î ¹Þ¾Æµé¿©Áö°í ÀÖ´Ù. ±¹³»¿¡¼­´Â Á¤ºÎÁÖ...more
Track > Session : Emerging Security Issues > Security Issues for Mobile Internet Services and Devices
¹ßÇ¥Á¦¸ñ : WiFi and FMC Service Security
¹ßÇ¥ÀÚ : ±èȯ±¹ (Ã¥ÀÓ/KISA)
°­¿¬¿ä¾à : FMC(Fixed/Mobile Convergence)´Â ÀÌÅë¸Á°ú À¯¼± ÀÎÅͳݸÁÀÌ ÅëÇÕµÈ À¯¹«¼± ÅëÇÕ È¯°æÀ¸·Î¼­ ±¹³»¿¡ ¼­´Â ÇϳªÀÇ ÈÞ´ëÆùÀ¸·Î ¿ÜºÎ¿¡¼­´Â ÀÌÅë¸ÁÀ¸·Î, Wi-FI°¡ ¼³Ä¡µÈ °÷¿¡¼­´Â ÀÎÅͳÝÀüÈ­ »ç¿ëÇÏ´Â ¼­ ºñ½º¸¦ ¸»ÇÑ´Ù. ÃÖ±Ù ½º¸¶Æ®Æù µî WiFi Áö¿ø ¸ð¹ÙÀÏ ±â±â º¸±Þ È®»ê, °³ÀÎÀÇ Åë½Å ºñ¿ë Àý°¨, ±â¾÷¿ë ¸ð¹ÙÀÏ ¿ÀÇǽº ...more
Track > Session : Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ : Practical AMI(Advanced Metering Infrastructure) Security
¹ßÇ¥ÀÚ : ³ªÁßÂù (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : The purpose of this presentation is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to secure that implementation appropriately. Cyber security is a critical iss ue d ue to the increasing potential of cyber attacks and incidents against thi...more
Track > Session : Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ : Security Requirement in Cloud Computing
¹ßÇ¥ÀÚ : ±èÁÖ¿µ (ÆÀÀå/KISA)
°­¿¬¿ä¾à : Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼­ÀÇ Áß¿ä À̽´´Â ¼­ºñ½º ¾ÈÁ¤È­, ½ÃÅ¥¸®Æ¼, ¹ý Àû¿ë ¹®Á¦ µîÀÌ¸ç ±âÁ¸ µ¥ÀÌÅÍ ¼¾ ÅÍÀÇ Ãë¾àÁ¡°ú Ŭ¶ó¿ìµå ÄÄÇ»Æà µ¥ÀÌÅÍ ¼¾Å͵µ À¯»çÇÏ´Ù. ±×·¯³ª Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æÀ¸·Î ÀÎÇÏ ¿© Ãß°¡ À§ÇùÀ̳ª Ãë¾àÁ¡µµ Á¸ÀçÇÑ´Ù. °ø°Ý ´ë»ó ¹× µ¥ÀÌÅÍ ÀúÀå ȯ°æ°ú »õ·Î¿î °ø°ÝÀÌ ¿¹»óµÇ¸ç °¡ »óÈ­ ¹× ´ë¿ë·® ºÐ...more
Track > Session : Emerging Security Issues > Green IT Security
¹ßÇ¥Á¦¸ñ : Security Implementation using Virtualization Technology
¹ßÇ¥ÀÚ : ±è±â¿µ (»ó¹«ÀÌ»ç/ÀÌ´ÏÅØ)
°­¿¬¿ä¾à : °¡»óÈ­ ±â¼úÀÇ ¼º¼÷µµ°¡ ³ô¾ÆÁü¿¡ µû¶ó ´Ù¾çÇÑ ºÐ¾ß¿¡¼­ °¡»óÈ­ ±â¼úÀ» ÀÌ¿ëÇÏ¿© º¸¾ÈÀ» °­È­ÇÏ·Á ´Â ¿òÁ÷ÀÓÀÌ ÀÖ´Ù. °¡»óÈ­°¡ º¸¾È°­È­¸¦ À§ÇÏ¿© »ç¿ëµÇ´Â »ç·Ê¸¦ °ËÅäÇØ º¸°í ÇâÈÄ ÃâÇöÀÌ ¿¡»óµÇ ´Â °¡»óÈ­¸¦ ÅëÇÑ º¸¾È°­È­ ¹æ¾ÈÀ» ¿¹»óÇØ º»´Ù. ¶ÇÇÑ ÀÌ·¯ÇÑ °¡»óÈ­¸¦ ÅëÇØ ¼­ºñ½º°¡ ÀÌ·ç¾îÁú ¶§ ¹ß»ýÇÒ ¼ö ÀÖ´Â À̽´...more
Track > Session : Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ : Dependable Wireless Networks
¹ßÇ¥ÀÚ : ¿°ÀÍÁØ (±³¼ö/¼º±Õ°ü´ëÇб³)
°­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â ¹«¼± ³×Æ®¿öÅ©ÀÇ ½Å·Ú¼º ¹®Á¦¸¦ ´Ù·é´Ù. ¹«¼± ³×Æ®¿öÅ©´Â ³×Æ®¿öÅ© ¸µÅ©°¡ °³¹æµÇ ¾î Àִ Ư¼ºÀ¸·Î ÀÎÇØ, À̱âÀûÀΠȤÀº ¾ÇÀÇÀûÀÎ »ç¿ëÀÚ¿¡ ÀÇÇØ ½±°Ô °ø°Ý´ç ÇÒ À§ÇèÀÌ ÀÖÀ¸¸ç, ÀÌ ¿¡ ´ëÇÑ ´Ù¾çÇÑ ÇØ°á ¹æ¹ýµéÀÌ ¿¬±¸µÇ°í ÀÖ´Ù. º» °­¿¬¿¡¼­´Â ÀÌ»óÀÇ ¹®Á¦¿¡ ´ëÇÑ ÃÖ±ÙÀÇ ¿¬±¸ ¼º°ú ¸¦ ¾Ë¾Æº»´Ù. - sel...more
Track > Session : Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ : Exploiting Capture Effect for Performance Enhancement in Wireless Networks
¹ßÇ¥ÀÚ : ¹é»óÇå (±³¼ö/°í·Á´ëÇб³)
°­¿¬¿ä¾à : Capture Effect´Â ¹«¼± ³×Æ®¿öÅ©¿¡¼­ µÎ °³ ÀÌ»óÀÇ ÆÐŶÀÌ µ¿½Ã¿¡ Àü¼ÛµÇ¾î ½ÅÈ£°¡ ÁßøµÇ´õ¶óµµ ¼ö ½Å ½Ã°£ ¹× ¼ö½Å °¨µµ¿¡ µû¶ó ÆÐŶÀ» ¿Ã¹Ù¸£°Ô ¼ö½ÅÇÒ ¼ö Àִ Ư¼ºÀ» ¸»ÇÑ´Ù. ÀÌ·¯ÇÑ Æ¯¼ºÀº ALOH A, CSMA/CA µî°ú °°Àº ±âÁ¸ ¹«¼± MAC¿¡¼­ÀÇ ÀϹÝÀûÀÎ °¡Á¤¿¡ À§¹èµÇ´Â °ÍÀ¸·Î ´Ù¸¥ À̸¦ ÀÌ¿ëÇÏ ¿© ¹«¼± ³×Æ®¿öÅ©ÀÇ ...more
Track > Session : Advanced Topics in Wireless Networks > Recent Advances in Wireless Network Research
¹ßÇ¥Á¦¸ñ : Capacity and Delay of Wireless Networks: Controllable Mobility Perspective
¹ßÇ¥ÀÚ : ±è¼º·û (±³¼ö/¿¬¼¼´ëÇб³)
°­¿¬¿ä¾à : À̵¿¼º ÁöÇâÀÇ ¹«¼±Åë½Å ³×Æ®¿öÅ©¿¡¼­ ³ëµå°£ Capacity (Transport vs. Transmission) ¹× Delay ÃÖÀûÈ­ ¸¦ À§Çؼ­ À̵¿¼º (Node mobility)¸¦ ¾î¶»°Ô È°¿ëÇØ¾ß ÇÏ´Â Áö¸¦ ¼Ò°³ÇÑ´Ù. À̸¦ ¹ÙÅÁÀ¸·Î À̵¿¼º Á¦ ¾î°¡ °¡´ÉÇÑ Machine (¿¹¸¦µé¾î ·Îº¿ ¹× Â÷·®)°£ÀÇ Á¤º¸ ±³È¯À» À§Çؼ­ ±âÁ¸ÀÇ ¹«¼±Åë½Å Æз¯´ÙÀÓ ÀÌ ¾î¶»°Ô ¹Ù...more
 01 02 03 04 05 06 07 08 09