167
Voted
ASIASIM
15 years 5 months ago
2004 Springer
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
114
click to vote
ASIASIM
15 years 5 months ago
2004 Springer
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
107
Voted
ASIASIM
15 years 5 months ago
2004 Springer
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
126
Voted
ASIASIM
15 years 5 months ago
2004 Springer
Abstract. Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption...
154
Voted
WSC
15 years 1 months ago
2004
This paper discusses a two-step virtual reality based conceptual design tool that enables industrial designers to create sketches of their ideas in 3-dimensional space in real tim...
|