¼¼ºÎÇÁ·Î±×·¥

 

77.   58
Track > Session : Beyond 4G Mobile Communication > Beyond 4G Systems
¹ßÇ¥Á¦¸ñ : Wireless Transmission Technology for B4G
¹ßÇ¥ÀÚ : ÀÌÁÖ¿ë (ÆÀÀå/KAIST)
°­¿¬¿ä¾à : 4¼¼´ë ¼¿·ê·¯ À̵¿Åë½Å ½Ã½ºÅÛÀº ¹«¼±·£À̳ª ÆèÅ伿µî°ú °°Àº ´Ù¾çÇÑ ¹«¼± ³×Æ®¿öÅ©µé°ú ÇÔ²² È¥ ÀçµÇ ¾î »ç¿ëµÉ °ÍÀ¸·Î º¸À̴µ¥, °í¿ë·®À» ´Þ¼ºÇϱâ À§Çؼ­´Â ¼ö¸¹Àº ¼ÒÇü¼¿·ÎÀÇ ÁøÈ­°¡ ¹Ù¶÷Á÷Çϳª ¸¹Àº ¼ÒÇü¼¿µéÀÌ È¥ÀçµÇ¾î Àִ ȯ°æ¿¡¼­´Â ÀÎÁ¢ ¼¿·ÎºÎÅÍÀÇ °£¼·Çö»óÀ¸·Î ÀÎÇؼ­ ¹«¼± ¿ë·® °¨¼Ò¿Í °ü ¸® ÀÇ ¾î...more
Track > Session : Beyond 4G Mobile Communication > Next-Generation WLAN/WPAN
¹ßÇ¥Á¦¸ñ : Key Technology Issues for IEEE 802.11ac Next Generation WLAN
¹ßÇ¥ÀÚ : Á¤¹ÎÈ£ (Project Leader/ETRI)
°­¿¬¿ä¾à : 2007³â 3¿ùºÎÅÍ WFA¿¡¼­ ½ÃÀÛµÈ ¡°Wi-Fi CERTIFIED¢â 802.11n draft 2.0¡± ÀÎÁõÀ» ÅëÇØ ÇöÀç±îÁö 180°¡ Áö°¡ ³Ñ´Â Á¦Ç°ÀÌ Ãâ½ÃµÇ°í ÀÖ´Â °¡¿îµ¥ ÀÌ·¯ÇÑ ½ÃÀåÀÇ »óȲÀ» ¹Ý¿µÇÏµí ¿©·¯ ¸Åü¸¦ ÅëÇØ IEEE 802.11n ÀÌ ÇÖÀ̽´·Î µîÀåÇÏ¿´´Ù. ÇÏÁö¸¸ WFAÀÇ ºÐ¼®¿¡ µû¸£¸é ÃÊ°íÈ­ÁúÀÇ ¿µ»óÀ» À§ÇÑ ¾ÐÃàµÇÁö ¾Ê´Â ºñµð ¿À, ...more
Track > Session : Beyond 4G Mobile Communication > Next-Generation WLAN/WPAN
¹ßÇ¥Á¦¸ñ : Key Technology Issues for IEEE 802.15.6 Visible Light Communications
¹ßÇ¥ÀÚ : À念¹Î (±³¼ö/±¹¹Î´ëÇб³)
°­¿¬¿ä¾à : IEEE 802.15.7 VLC°ü·Ã ±â¼úÀÇ Ç¥ÁØÈ­°¡ ÇöÀç ÁøÇàµÇ°í ÀÖ´Ù. Ãֱ٠ǥÁØÈ­ Hot À̽´ ¹× Çٽɱâ¼úÀ» ¼Ò°³ÇÏ°íÀÚ ÇÑ´Ù. ƯÈ÷ VLC °ü·Ã PHY, MAC, Link Switching, Interference Management ±â¼ú µîÀ» ¼Ò°³ÇÏ °íÀÚÇÑ´Ù.more
Track > Session : Beyond 4G Mobile Communication > Next-Generation WLAN/WPAN
¹ßÇ¥Á¦¸ñ : Tera Hz Wireless Personal Communication Systems
¹ßÇ¥ÀÚ : °í¿µÃ¤ (±³¼ö/°í·Á´ë)
°­¿¬¿ä¾à : Ultra HD (UHD), 3D ¿µ»ó Àü¼Û, Â÷·® °£ÀÇ °í¼Ó Åë½Å, ÃÊ°í¼Ó ¹«¼±·£ ¼­ºñ½º¸¦ À§Çؼ­´Â 10Gbps~40Gb ps´ë¿ªÀÌ ÇÊ¿äÇÏ´Ù. À̸¦ °¡´ÉÇÏ°Ô Çϱâ À§ÇÏ¿© THz´ë¿ª(300GHz ´ë¿ª¿¡¼­ ½ÃÀÛÇÏ´Â sub-¹Ð¸®¹ÌÅÍ ÆÄ ´ë¿ª (ÆÄÀå<1mm)À» Æ÷ÇÔÇÑ 100GHzÀÌ»óÀÇ ´ë¿ªÀ» ÁöĪ) ÁÖÆļö¸¦ ÀÌ¿ëÇÑ Super Ultra Wideband (S UWB) WPAN½Ã½ºÅÛ ...more
Track > Session : Security in Smart Environment > National Security against Cyber War/Terror
¹ßÇ¥Á¦¸ñ : Cyber War/Terror Recent Trend and Countermeasures
¹ßÇ¥ÀÚ : ·ùµ¿ÁÖ (ÆÀÀå/¢ßÁ¤º¸º¸È£±â¼ú)
°­¿¬¿ä¾à : ÃÖ±Ù IT±â¼úÀº ºñ¾àÀûÀÎ ¹ßÀüÀ» °ÅµìÇÏ¿© ½Ã°£°ú °ø°£ÀÇ Á¦¾à¾øÀÌ ¸ðµç Á¤º¸¸¦ ¾òÀ»¼ö ÀÖ´Â ±Ù°£ ÀÌ µÇ ¾ú´Ù. ½º¸¶Æ®Æù°ú À̸¦ ÀÌ¿ëÇÑ ¹«¼± Åë½ÅÀÇ ¹ßÀüÀº ´ë¿ªÆøÀÇ ºÎÁ· Çö»óÀ» ÃÊ·¡ÇÏ¿´°í ÀÌ¿ëÀÚÀÇ Æí ÀǼº °ú ¿øÈ°ÇÑ Åë½Åȯ°æ Á¦°øÀ» À§ÇØ ¸¹Àº ºñ¿ëÀ» Ãß°¡ÇÏ°í ÀÖ´Â »óȲÀÌ´Ù. ´õºÒ¾î »ç¿ëÀÚ°¡ ¸¹¾ÆÁüÀ¸ ·Î ÀÎ ÇØ...more
Track > Session : Security in Smart Environment > National Security against Cyber War/Terror
¹ßÇ¥Á¦¸ñ : 3.4 DDoS Experience and Future Works
¹ßÇ¥ÀÚ : ½Å´ë±Ô (Á¾ÇÕ»óȲ°üÁ¦ÆÀÀå/Çѱ¹ÀÎÅͳÝÁøÈï¿ø(KISA))
°­¿¬¿ä¾à : ¡¯11. 3. 4 ¹ß»ýÇÑ 3.4 DDoS °ø°ÝÀÇ Æ¯Â¡À» ÀϹÝÀûÀÎ DDoS °ø°Ý°úÀÇ Â÷ÀÌÁ¡, Áö³­ ¡®09³â ¹ß»ýÇÑ 7.7 DD oS °ø °Ý°úÀÇ Â÷ÀÌÁ¡ µîÀ» Åä´ë·Î ºñ±³ ºÐ¼®ÇÏ¿© ¾Ë¾Æº»´Ù. Áö³­ 7.7 DDoS ħÇØ»ç°í ÀÌÈÄ ÃßÁøÇÑ »ç¾÷, ƯÈ÷ ³×Æ®¿öÅ© Áß½ÉÀÇ ´ëÀÀ¿¡¼­ »ç¿ëÀÚ¿Í ¼­ºñ½º±îÁö ´ëÀÀ ¹üÀ§¸¦ È®´ëÇϱâ À§ÇÏ¿© ÃßÁøÇÑ °¨¿°PC »çÀ̹ö ...more
Track > Session : Security in Smart Environment > National Security against Cyber War/Terror
¹ßÇ¥Á¦¸ñ : Power Infra(Smart Grid) Security Threats and Respond
¹ßÇ¥ÀÚ : ¼­Á¤Åà (ÆÀÀå/±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò(ETRI ºÎ¼³¿¬±¸¼Ò))
°­¿¬¿ä¾à : - ±¹°¡ ½Å¼ºÀ嵿·Â »ç¾÷À¸·Î ÃßÁøµÇ°í ÀÖ´Â ½º¸¶Æ®±×¸®µåÀÇ °³³ä, ÃßÁø¹è°æ ¹× ÃßÁøÇöȲ À» ¼³¸íÇÏ°í, ½º¸¶Æ®±×¸®µå°¡ »çÀ̹ö°ø°ÝÀÇ Á¦1¸ñÇ¥°¡ µÉ ¼ö ÀÖÀ½À» °­Á¶Çϸç, ½º¸¶Æ®±×¸®µå º¸¾ÈÀ§ Çù ¹× °ø°Ý ¿¹»ó ½Ã³ª¸®¿À¸¦ ¼³¸íÇÑ´Ù. À̾, ±¹¿Ü ½º¸¶Æ®±×¸®µå º¸¾È ÃßÁøÇöȲÀ» »ìÆìÇÏ°í, ±¹³»¿¡ ¼­ ÁøÇàµÇ°í ÀÖ´Â ...more
Track > Session : Security in Smart Environment > Security in Future Internet
¹ßÇ¥Á¦¸ñ : Trustworthy Issues on the Future Internet
¹ßÇ¥ÀÚ : ¼­µ¿ÀÏ (ÆÀÀå/Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø)
°­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â ¹Ì·¡ÀÎÅÍ³Ý ¿¬±¸ ºÐ¾ß¿¡¼­ °¡Àå Å« À̽´Áß ÇϳªÀÎ Trustworthy °ü·Ã µ¿ÇâÀ» ¾Ë¾Æº¸ °íÀÚ ÇÑ´Ù. ƯÈ÷, ¹Ì±¹ NSF¿¡¼­ 2010³â ½ÃÀÛµÈ 4°³ÀÇ FIA ÇÁ·Î±×·¥Áß ÇϳªÀÎ XIA (eXpressive Internet Archit ectu re) ÇÁ·ÎÁ§Æ®¸¦ Áß½ÉÀ¸·Î ¹Ì·¡ ÀÎÅÍ³Ý È¯°æ¿¡¼­ ½Å·ÚÅë½ÅÀ» ±¸ÇöÇϱâ À§ÇØ ¾î¶°ÇÑ ¹æ¹ýµéÀÌ ¿¬±¸µÇ ...more
Track > Session : Security in Smart Environment > Security in Future Internet
¹ßÇ¥Á¦¸ñ : Future Internet Authentication, Authorization Trend and Prospect
¹ßÇ¥ÀÚ : ¹Ú½Âö (±³¼ö/Çѱ¹±â¼ú±³À°´ëÇб³)
°­¿¬¿ä¾à : º» ¹ßÇ¥´Â ¹Ì·¡ ÀÎÅÍ³Ý È¯°æ¿¡¼­ »ç¿ëÀÚ ÀÎÁõ(authentication) Æ÷ÇÔÇÏ´Â ½Å¿ø °ü¸®(identity managemen t) ¹®Á¦¿¡ ´ëÇØ Åä·ÐÇÑ´Ù. ¸ÕÀú ÇöÀç ÀÎÅͳݻóÀÇ ÀÎÁõ ¸ÞÄ¿´ÏÁò, ½Å¿ø °ü¸®ÀÇ ÇöȲ°ú ¹®Á¦Á¡, ±×¸®°í ¹Ì·¡ ÀÎÅͳݻóÀÇ ½Å¿ø °ü¸® ¿ä±¸ »çÇ×À» Á¤¸®ÇÑ´Ù. ±×·± ´ÙÀ½ OIDF(OpenID Foundation), ICF(Information C ...more
Track > Session : Security in Smart Environment > Security in Future Internet
¹ßÇ¥Á¦¸ñ : Mobile Network Security Threats and Respond
¹ßÇ¥ÀÚ : ÀÓäÅ (ÆÀÀå/Çѱ¹ÀÎÅͳÝÁøÈï¿ø)
°­¿¬¿ä¾à : O 3G ¸ð¹ÙÀÏ ¸Á¿¡¼­ÀÇ º¸¾È À§ÇùÀ» »ìÆ캸°í - ±¹Á¦ ÀüÈ­, SMS °ú´Ù Àü¼Û, À¯·á ÀüÈ­/¹®ÀÚ µîÀ» ºÒ¹ý °ú±ÝÀ¯¹ß, - DoS/DDoS °ø°ÝÀ¸·Î ÀÎÇÑ ¸ð¹ÙÀÏ ¸Á Àåºñ Àå¾Ö À¯¹ß - Áö¼ÓÀûÀÎ Á¦¾î¸Þ½ÃÁö Àü¼ÛÀ» ÅëÇÑ ´Ü¸» ÀÚ¿ø¼Ò¸ð µî º¸¾ÈÀ§Çù O 3G ¸ð¹ÙÀÏ ¸Á ¹× ´Ü¸»À» º¸È£Çϱâ À§ÇÑ ´ëÀÀ ¹æ¾ÈÀ» Á¦½Ã - µ¥ÀÌÅÍ, À½¼º, SMS, ...more
 01 02 03 04 05 06 07 08