J. KIMS Technol Search

CLOSE


Search

  • HOME
  • Search
Two-level Information Hiding Method for the Transmission of Military Secret Images
In-Taek Kim, Jae-Cheol Kim, Yong-Kyun Lee
J. KIMS Technol. 2011;14(3):482-491.
PDF    
An Architecture Design of Military Operation System Utilizing Cellular Networks
Jae-Cheol Kim, In-Taek Kim, Jong-Bum Park, Chang-Uk Jung
J. KIMS Technol. 2011;14(1):74-83.
PDF    
A Study on a Group Key Agreement using a Hash Function
Jun Lee, In-Taek Kim, Jong-Bum Park
J. KIMS Technol. 2010;13(4):627-634.
PDF    
Steganographic Method Based on Three Directional Embedding
Ki-Hyun Jung, In-Taek Kim, Jae-Cheol Kim
J. KIMS Technol. 2010;13(2):268-274.
PDF    
A Key Distribution Protocol based on ECC
Jun Lee, In-Taek Kim
J. KIMS Technol. 2007;10(2):142-147.
PDF    


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2024 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next