Digital Library
Search: "[ keyword: authentication ]" (40)
-
Gyu-Sung Ham, Su-Chong Joo, Vol. 21, No. 4, pp. 25-34, Aug. 2020
10.7472/jksii.2020.21.4.25
Keywords: Automatic Authentication System, Patient’s Situation, Authentication Service application, Medical Information System Emergency Decisions, Executability Verification -
Nakhoon Choi, Heeyoul Kim, Vol. 20, No. 6, pp. 119-127, Dec. 2019
10.7472/jksii.2019.20.6.119
Keywords: Blockchain, Ethereum, authentication, MetaMask, Personal Imformation, Decentralize -
Zhun Li, HyeYoung Lee, Youngjun Lee, Sooji Yoon, Byeongil Bae, Ho-Jin Choi, Vol. 20, No. 1, pp. 25-37, Feb. 2019
10.7472/jksii.2019.20.1.25
Keywords: Deep Learning, Handwriting Recognition, Writer Verification, Authentication System, One-time password, FIDO -
Gyu-Sung Ham, Own-jeong Seo, Hoill Jung, Su-Chong Joo, Vol. 19, No. 6, pp. 31-40, Dec. 2018
10.7472/jksii.2018.19.6.31
Keywords: Dynamic Situation Authentication Mechanism and Authentication System, Emergency Status Condition, Medical Information and Access Service, u-Medical Information System Environment -
Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
10.7472/jksii.2018.19.5.55
Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto -
6. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction TechnologyYounsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
10.7472/jksii.2016.17.3.01
Keywords: User authentication scheme, biometrics, fuzzy extraction -
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
10.7472/jksii.2015.16.1.21
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication -
Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
10.7472/jksii.2014.15.3.79
Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI -
Okkyung Choi, Wooyeol Jung, Bong Gyou Lee, Seungbin Moon, Vol. 15, No. 1, pp. 55-62, Feb. 2014
10.7472/jksii.2014.15.1.55
Keywords: Mobile Cloud Computing, Human-friendly Robot Service, User Authentication, Big Data Processing Technology, Log-data Analysis -
Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
10.7472/jksii.2013.14.4.43
Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)