• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: "[ keyword: authentication ]" (43)
  1. 1. A Study on Medical Information Platform Based on Big Data Processing and Edge Computing for Supporting Automatic Authentication in Emergency Situations
  2. 2. Study on Threshold Scheme based Secure Secret Sharing P2P System
    Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
    10.7472/jksii.2022.23.3.21
    Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication
  3. 3. Development of Authentication Service Model Based Context-Awareness for Accessing Patient’s Medical Information
  4. 4. Implementation of An Automatic Authentication System Based on Patient’s Situations and Its Performance Evaluation
  5. 5. A Blockchain-based User Authentication Model Using MetaMask
    Nakhoon Choi, Heeyoul Kim, Vol. 20, No. 6, pp. 119-127, Dec. 2019
    10.7472/jksii.2019.20.6.119
    Keywords: Blockchain, Ethereum, authentication, MetaMask, Personal Imformation, Decentralize
  6. 6. Handwritten One-time Password Authentication SystemBased On Deep Learning
  7. 7. Implementation of Dynamic Situation Authentication System for Accessing Medical Information
  8. 8. Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation
    Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
    10.7472/jksii.2018.19.5.55
    Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto
  9. 9. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology
    Younsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
    10.7472/jksii.2016.17.3.01
    Keywords: User authentication scheme, biometrics, fuzzy extraction
  10. 10. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication