• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: authentication" (38)
  1. 1. Handwritten One-time Password Authentication SystemBased On Deep Learning
  2. 2. Implementation of Dynamic Situation Authentication System for Accessing Medical Information
  3. 3. Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation
    Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
    10.7472/jksii.2018.19.5.55
    Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto
  4. 4. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology
    Younsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
    10.7472/jksii.2016.17.3.01
    Keywords: User authentication scheme, biometrics, fuzzy extraction
  5. 5. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  6. 6. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  7. 7. A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
  8. 8. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)
  9. 9. Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments
    Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
    10.7472/jksii.2012.13.2.51
    Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments
  10. 10. A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment
    Aymen Abdullah Alsaffar, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh, Vol. 13, No. 2, pp. 21-32, Apr. 2012
    10.7472/jksii.2012.13.2.21
    Keywords: N-Screen Session Manager, Thin-Client, Cloud computing, SIP, authentication