


default search action
4th ITCS 2012: Gwangju, Korea
- James Jong Hyuk Park, Jongsung Kim, Deqing Zou, Yang Sun Lee

:
Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012, Gwangju, Korea, September 6-8, 2012. Lecture Notes in Electrical Engineering 180, Springer 2012, ISBN 978-94-007-5082-1 - Carlos Juiz

, Mercedes Gómez, M. Isabel Barceló:
Implementing Business/IT Projects Alignment through the Project Portfolio Approval Process. 1-8 - Hyunjoong Kang, Junwook Lee, Hyochan Bang, Sungsoo Kang:

A Design of IoT Based Agricultural Zone Management System. 9-14 - Dae-Heon Park, Kyo-Hoon Son, Se-Han Kim:

A Design of Plant Factory Environment Control System. 15-20 - Yoon-Sik Yoo, Jaehak Yu, Byung-Bog Lee, Hyo-Chan Bang:

A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up Services. 21-27 - Yong-chul Lee, Sok-Kyu Lee, Woong Cho:

Adaptive Auto Bias Control in Wireless Communication Systems. 29-34 - Min Woo Cheon, Tae Gon Kim, Dae-Hwan Youn, Ki-Won Nam, Chang-Su Na, Young-Eok Kim, Jung-Chul Lee:

Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan Moxibustion. 35-40 - Yang Sun Lee

, Tae Gon Kim, Min Woo Cheon:
Wound Healing Effect by 633 nm Wavelength Using LED Irradiator. 41-46 - Jungsik Hwang, Kyungmi Chung

, Jinshil Hyun, Jeha Ryu
, Kwangsu Cho:
Development and Evaluation of an In-Vehicle Haptic Navigation System. 47-53 - Babar Shah, Ki-Il Kim

:
Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks. 55-61 - Namseok Lee, Kwangsu Cho:

Natural Language Processing for Modeling Stable Writing Characteristics of Users. 63-70 - Sung Yeon Kim, Kwangsu Cho:

Electronic Cane Usability for Visually Impaired People. 71-78 - Hongwei Ge, Qiaoxia Zhang, Fan Wang:

Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance Function. 79-86 - Yanjun Chen, Wangmeng Zuo, Zhaoxin Li, Kuanquan Wang:

3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured Light. 87-93 - Moonsik Kang, Kilhung Lee:

Adaptive Resource Control Strategy over Cognitive Networks for Multimedia Services. 95-102 - Deng Chuan:

Towards a Trusted Vehicular Routing in VANET. 103-117 - Muhammad Yasin, Muhammad Abulaish

, Muhammad Nour Naeem Elmogy:
Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. 119-126 - Longbo Ran, Hai Jin:

SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems. 127-133 - Guoying Li, Bin Dong, Xiuqiao Li, Qimeng Wu, Qianqian Zhong, Mingfa Zhu, Limin Xiao, Li Ruan:

Data Consistency for Self-acting Load Balancing of Parallel File System. 135-143 - Hongfeng Wu

, Rongquan Feng:
Isomorphism Classes of Jacobi Quartic Curve over Finite Fields. 145-153 - Heesook Choi, Phyllis Reuther:

Fingerprinting Data Based on Secret Mask. 155-162 - Hae-Jong Joo, Bong-Hwa Hong, Euy-Soo Lee, Hae-Kil Choi:

Packet-Based Quality Measurement and Analysis for Mobile VoIP Service. 163-170 - Hai-Cheng Chu, Szu-Wei Yang, Shiuh-Jeng Wang, Jong Hyuk Park:

The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone. 171-178 - Yee-Lee Er, Wei-Chuen Yau, Syh-Yuan Tan, Bok-Min Goi

:
Email Encryption System Using Certificateless Public Key Encryption Scheme. 179-186 - Sooyoung Park, Hyunji Chung, Changhoon Lee

, Sangjin Lee:
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent. 187-195 - Jeehee Lee, Hyunji Chung, Changhoon Lee

, Sangjin Lee:
Methodology for Digital Forensic Investigation of iCloud. 197-206 - Jong-Hyun Choi, Keun-Gi Lee, Jungheum Park

, Changhoon Lee
, Sangjin Lee:
Analysis Framework to Detect Artifacts of Portable Web Browser. 207-214 - Neeraj Kumar

, Jongsung Kim:
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET. 215-223 - Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won:

Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity. 225-231 - Mijin Kim

, Namje Park
, Dongho Won:
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. 233-240 - Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, Dongho Won:

Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device. 241-247 - Youngsoo Kim

, Namje Park
:
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful Contents. 249-256 - Yilip Kim, Namje Park

:
Elementary Education of Creativity Improvement Using Rube Goldberg's Invention. 257-263 - Namje Park

:
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band's Integration in U-Sensor Network Era. 265-271 - Ada Hui-Chuan Chen, Huei-Chung Chu, Sou-Chein Wu:

Security Balancing for IT-Enabled Service Innovation. 273-277 - Huei-Chung Chu, Ada Hui-Chuan Chen:

The Electronic Bidding System Based on Public Key Infrastructure. 279-283 - Wen-Chung Kuo, Yi-Heng Chen, Yu-Chih Huang:

High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement. 285-291

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














