ŠØ‘‰Y€H‰È‘åŠw/ŠØ‘‚—í‘åŠw‚Ƃ̌𗬉ï

[English Page]
‘æ2Œ¤‹†Žº > Œ¤‹†Œð—¬Šˆ“® > ŠØ‘‰Y€H‰È‘åŠw/ŠØ‘‚—í‘åŠw‚Æ‚ÌŒð—¬
“úŽžF2006”N2ŒŽ20“ú 13:00`18:30
êŠF•Ÿ‰ªƒVƒXƒeƒ€LSIƒZƒ“ƒ^[@‰ï‹cŽºA(•Ÿ‰ªŒ§•Ÿ‰ªŽs)
ŽQ‰ÁŽÒF ŠØ‘‰Y€H‰È‘åŠwFProf. Pil Joong LeeCProf. Jong KimCProf. Sungje HongCŒ¤‹†ŽºŠw¶
ŠØ‘‚—í‘åŠwFProf. Heejo LeeCŒ¤‹†ŽºŠw¶
‹ãBƒVƒXƒeƒ€î•ñ‹ZpŒ¤‹†Š(ISIT)FŸNˆäKˆêC¼—³ŽOC‚‹´Œ’ˆêCã”É‹`Žj
‹ãB‘åŠwFŸNˆäŒ¤‹†Žº3–¼

yŠT—vz
--------------------------------------------------------------------------------

ISIT

ISIT‚̏Љî
ã”É‹`Žj


î•ñ’ñ‹ŸŽÒŽå‘̂̌lî•ñ•ÛŒì‚ª‰Â”\‚ȃ†ƒrƒLƒ^ƒXƒlƒbƒgƒ[ƒN‚̃tƒŒ[ƒ€ƒ[ƒN
ã”É‹`Žj

--------------------------------------------------------------------------------

ŠØ‘‰Y€H‰È‘åŠw

Implementation of Finite Field with Characteristic 7
Yeon Hyeong Yang

Annulling Data Injection Attacks with Return Address Randomization
Deokjin Kim, Cheolsoon Yim

Integrating DRM with P2P by removing license server
Heejae Park

Polymorphic Worm Detection by Instruction Distribution
Kihun Lee

Profile-based Web Application Security System
Kyungtae Kim

An Enhanced Buffer Separation Scheme to Protect Security Sensitive Data against Buffer Overflow Attacks
Lee, Seung Min, Lee, Seung Ick

Marking Scheme for Semantic-aware Web Application Security
Tae Hyung Kim

Anti-Phishing Scheme: Preventing Confidential Data from Posted to Spoofed Site
Hunsuk Choi, Yuna Kim

--------------------------------------------------------------------------------

ŠØ‘‚—í‘åŠw

PCAV: Evaluation of Parallel Coordinates Attack Visualization
Hyunsang Choi, Heejo Lee

Detection Unknown Worms Using Randomness Check
Hyundo Park, Heejo Lee

A Taxonomy of Online Game Attacks and Defenses

Copyright © 2006 Institute of Systems & Information Technologies/KYUSHU. All Rights Reserved.