- Full text PDF available (4)
- This year (0)
- Last 5 years (4)
- Last 10 years (4)
Journals and Conferences
In this paper we suggest improved IKE key exchange protocol combined with the Computer Security USB Key device to solve the problems in using IKE and IKE v2 protocol.
This Paper proposes an ECDH key exchange method and an ECsig Digital Signature Authentication method based on ) ( 2m F E group with Koblits curve, man-in-the-middle attack prevention method for SA payload and initiator identification payload to design high intensity IKE that can be implemented in portable devices.
This paper proposes a PKINIT_AS Kerberos V5 authentication system to use public key cryptography and a method to implement the gssapi_krb authentication method and secured Internet service using it in IPSec VPN
This paper describes the algorithm for translating English negative sentences into Korean in English-Korean Machine Translation (EKMT). The proposed algorithm is based on the comparative study of English and Korean negative sentences. The earlier translation software cannot translate English negative sentences into accurate Korean equivalents. We… (More)