• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: Protocol" (37)
  1. 1. A Study on Workbench-based Dynamic Service De-sign and Construction of Computational Science Engineering Platform
    Yejin Kwon, Inho Jeon, Jin Ma, Sik Lee, Kum Won Cho, Jerry Seo, Vol. 19, No. 3, pp. 57-66, Jun. 2018
    10.7472/jksii.2018.19.3.57
    Keywords: Cloud computing, service portlet, workbench, Protocol, event processing
  2. 2. Privacy-Preserving DNA Matching Protocol
    Geontae Noh, Vol. 19, No. 2, pp. 1-7, Apr. 2018
    10.7472/jksii.2018.19.2.1
    Keywords: Privacy-Preserving Inner Product, DNA Matching Protocol
  3. 3. Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device
    Jong-ho Bang, Song-Yeon Lee, Jong-Ho Paik, Vol. 19, No. 1, pp. 19-26, Feb. 2018
    10.7472/jksii.2018.19.1.19
    Keywords: Sensor device, Bluetooth, Protocol, Internet of Thing, Smartphone application
  4. 4. Efficient Content Delivery Method in Wireless Content-Centric Network
    Chan-Min Park, Byung-Seo Kim, Vol. 18, No. 2, pp. 13-20, Apr. 2017
    10.7472/jksii.2017.18.2.13
    Keywords: Content-Centric Network, WIreless, Content, Protocol
  5. 5. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  6. 6. Hybrid Spray and Wait Routing Protocol in DTN
    Sung-Su Hyun, Hyeon-Jin Jeong, Seoung-Sik Choi, Vol. 15, No. 3, pp. 53-62, Jun. 2014
    10.7472/jksii.2014.15.3.53
    Keywords: DTN Protocol, Spray and Wait Protocol, One simulator
  7. 7. Development of Update Methods for Configuration Data of NETCONF Protocol considering Multiple Network Administrators
    Yang-Min Lee, Mi-Yang Cha, Jae-Kee Lee, Vol. 14, No. 5, pp. 27-38, Oct. 2013
    10.7472/jksii.2013.14.5.27
    Keywords: Manager Protocol, Operation layer, Content layer, Efficiency of operations, NETCONF Protocol
  8. 8. Adaptive RFID anti-collision scheme using collision information and m-bit identification
    Je-Yul Lee, Jongmin Shin, Dongmin Yang, Vol. 14, No. 5, pp. 1-10, Oct. 2013
    10.7472/jksii.2013.14.5.01
    Keywords: RFID, Anti-collision, M-ary Query Tree Protocol
  9. 9. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  10. 10. Performance of Serial Communication Protocols through Conducting Threads