TY - GEN
T1 - Time stamp protocol for smart environment services
AU - Lee, Deok Gyu
AU - Han, Jong Wook
AU - Park, Jong Hyuk
AU - Yeo, Sang Soo
AU - Jeong, Young Sik
PY - 2008
Y1 - 2008
N2 - By development of wireless mobile communication, many users incr-eased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is not service of voice putting first in wireless hereafter. Problems by much development of service are happening, because a transmit is exposed, problem point that radio net is much unlawful stealing use and tapping etc. by user that is not right can happen. Need method to keep away purpose that is enemy of third party in contract between both men as well as problem for document or accounting information which the third user that is enemy of third party is shared. By solution about problems, certification of contents for document and visual point confirmation must it. Applied service or certification of contents service that is rapidly point of time that is using in wire to solve problem that refer in front in this treatise in smart environment to develop hereafter. Way to propose proposed efficient way using individual in smart environment just as it is.
AB - By development of wireless mobile communication, many users incr-eased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is not service of voice putting first in wireless hereafter. Problems by much development of service are happening, because a transmit is exposed, problem point that radio net is much unlawful stealing use and tapping etc. by user that is not right can happen. Need method to keep away purpose that is enemy of third party in contract between both men as well as problem for document or accounting information which the third user that is enemy of third party is shared. By solution about problems, certification of contents for document and visual point confirmation must it. Applied service or certification of contents service that is rapidly point of time that is using in wire to solve problem that refer in front in this treatise in smart environment to develop hereafter. Way to propose proposed efficient way using individual in smart environment just as it is.
UR - http://www.scopus.com/inward/record.url?scp=48249156545&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-69293-5_46
DO - 10.1007/978-3-540-69293-5_46
M3 - Conference contribution
AN - SCOPUS:48249156545
SN - 3540692924
SN - 9783540692928
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 591
EP - 601
BT - Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings
T2 - 5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008
Y2 - 23 June 2008 through 25 June 2008
ER -