[1] R. Lychev; S. Jero; A. Boldyreva; C. Nita-Rotaru , "How Secure and Quick is QUIC? Provable Security and Performance Analyses" 2015 IEEE Symposium on Security and Privacy Year: 2015 Pages: 214 - 231, DOI: 10.1109/SP.2015.21
[2] P. Rogaway, “Authenticated-encryption with associated-data,”in Proceedings of the 9th ACM Conference on Computer and Communications Security, ser. CCS ’02. ACM, 2002, pp.98–107.
[3] 성능/교전 효과도의 상호 분석이 가능한 전투 개체 기반의 모델링 방법론 : 상세 모델 설계 및 모델 구현 서경민*,1)․최창범1)․김탁곤1) 한국과학기술원 전기 및 전자공학과
- studied paper ([1].[2], [3] )
- prepared presentation of paper [3]
- Real-time system
: found idea or subject about 3 keyword (capacitor, inductor, resistance)
: made brief ppt file
- virtualization(from hanwha thales) project
: gather documents and code(RDP Protocol)
: wrote progresses as paper form
- virtualization(from hanwha thales) project
: RDP code analysis
: gather RDP research result
: prepare a presentation at hanwha thales
: study C++ and image precessing
- study papers ([1].[2], [3] )
- keep preparing presentation of paper [3]
- Real-time system
: develop the idea (capacitor -> stabilization in a car system )
: make brief ppt file
virtualization
: gather documents and code(RDP Protocol)
: wrote progresses as paper form
: studied C++ and image precessing
: RDP code analysis
: gather RDP research result
> byte-stream based encoding formet
> RDP source code researching
> data compression/encoding code researching
> auto-reconnection
> huffman encoding
> static virtual channel
: prepare a presentation at hanwha thales
: study C++ and image precessing
1) write paper for domestic journal
2) choose a subject for graduation paper
1) write paper for international journal
2) write paper for international conference