Electronics and Telecommunications Research Institute

Displaying 1-10 of 10 results

  • White Papers // Jul 2013

    SimpleLock: Fast and Accurate Hybrid Data Race Detector

    Data races are one of the major causes of concurrency bugs in multithreaded programs, but they are hard to find due to nondeterministic thread scheduling. Data race detectors are essential tools that help long-suffering programmers to locate data races in multithreaded programs. One type of detectors precisely detects data races...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Mar 2013

    Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel

    Over the last decade, there has been a lot of interest to transfer energy wirelessly and recently, Radio Frequency (RF) radiation has become a viable source for energy harvesting. It is nowadays possible to transfer the energy wirelessly with a reasonable efficiency over small distances and, furthermore, the Wireless Sensor...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Sep 2011

    Localization Using Mobile Anchor Trajectory in Wireless Sensor Networks

    Due to increasing applications using location information, localization has been one of important research issues in Wireless Sensor Networks (WSN). A straight-forward approach is to add the GPS receivers to all nodes. Because of the strict H/W restrictions of WSN applications, localization schemes, which do not need expensive H/W devices,...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Apr 2010

    Partial EBG Structure with DeCap for Ultra-Wideband Suppression of Simultaneous Switching Noise in a High-Speed System

    To supply a power distribution network with stable power in a high-speed mixed mode system, simultaneous switching noise caused at the multilayer PCB and package structures needs to be sufficiently suppressed. The Uniplanar Compact Electromagnetic BandGap (UC-EBG) structure is well known as a promising solution to suppress the power noise...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Liveness Detection for Embedded Face Recognition System

    To increase reliability of face recognition system, the system must be able to distinguish real face from a copy of face such as a photograph. In this paper, the authors propose a fast and memory efficient method of live face detection for embedded face recognition system, based on the analysis...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    DHCP Message Authentication With an Effective Key Management

    In this paper the authors describe the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Design of Integration Security System Using XML Security

    In this paper, the authors design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Specialized Web Robot for Objectionable Web Content Classification

    This paper proposes a specialized Web robot to automatically collect objectionable Web contents for use in an objectionable Web content classification system, which creates the URL database of objectionable Web contents. It aims at shortening the update period of the DB, increasing the number of URLs in the DB, and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Status and Requirements of Counter-Cyberterrorism

    The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jan 2009

    Multi-Hash Based Pattern Matching Mechanism for High-Performance Intrusion Detection

    Many Network-based Intrusion Detection Systems (NIDSs) are developed till now to respond these network attacks. As network technology presses forward, Gigabit Ethernet has become the actual standard for large network installations. Therefore, software solutions in developing high-speed NIDSs are increasingly impractical. It thus appears well motivated to investigate the hardware-based...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jan 2009

    Multi-Hash Based Pattern Matching Mechanism for High-Performance Intrusion Detection

    Many Network-based Intrusion Detection Systems (NIDSs) are developed till now to respond these network attacks. As network technology presses forward, Gigabit Ethernet has become the actual standard for large network installations. Therefore, software solutions in developing high-speed NIDSs are increasingly impractical. It thus appears well motivated to investigate the hardware-based...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Mar 2013

    Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel

    Over the last decade, there has been a lot of interest to transfer energy wirelessly and recently, Radio Frequency (RF) radiation has become a viable source for energy harvesting. It is nowadays possible to transfer the energy wirelessly with a reasonable efficiency over small distances and, furthermore, the Wireless Sensor...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    DHCP Message Authentication With an Effective Key Management

    In this paper the authors describe the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Design of Integration Security System Using XML Security

    In this paper, the authors design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Specialized Web Robot for Objectionable Web Content Classification

    This paper proposes a specialized Web robot to automatically collect objectionable Web contents for use in an objectionable Web content classification system, which creates the URL database of objectionable Web contents. It aims at shortening the update period of the DB, increasing the number of URLs in the DB, and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Status and Requirements of Counter-Cyberterrorism

    The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Liveness Detection for Embedded Face Recognition System

    To increase reliability of face recognition system, the system must be able to distinguish real face from a copy of face such as a photograph. In this paper, the authors propose a fast and memory efficient method of live face detection for embedded face recognition system, based on the analysis...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Sep 2011

    Localization Using Mobile Anchor Trajectory in Wireless Sensor Networks

    Due to increasing applications using location information, localization has been one of important research issues in Wireless Sensor Networks (WSN). A straight-forward approach is to add the GPS receivers to all nodes. Because of the strict H/W restrictions of WSN applications, localization schemes, which do not need expensive H/W devices,...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Apr 2010

    Partial EBG Structure with DeCap for Ultra-Wideband Suppression of Simultaneous Switching Noise in a High-Speed System

    To supply a power distribution network with stable power in a high-speed mixed mode system, simultaneous switching noise caused at the multilayer PCB and package structures needs to be sufficiently suppressed. The Uniplanar Compact Electromagnetic BandGap (UC-EBG) structure is well known as a promising solution to suppress the power noise...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jul 2013

    SimpleLock: Fast and Accurate Hybrid Data Race Detector

    Data races are one of the major causes of concurrency bugs in multithreaded programs, but they are hard to find due to nondeterministic thread scheduling. Data race detectors are essential tools that help long-suffering programmers to locate data races in multithreaded programs. One type of detectors precisely detects data races...

    Provided By Electronics and Telecommunications Research Institute