• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)

Digital Library

Search: " keyword: Security" (54)
  1. 21. A Study on Smart card-based Security Mechanisms of upgrades Smart Meter SW for secure deployment in Smart Grid
    Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
    Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument
  2. 22. A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model
    Adila Firdaus Arbain, Imran Ghani, Seung Ryul Jeong, Vol. 15, No. 1, pp. 13-28, Feb. 2014
    Keywords: Agile Methodology, Security, software engineering, Feature Driven Development
  3. 23. An Object-Oriented Analysis and Design Methodology for Security of Web Applications
    Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
    Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE
  4. 24. An Analysis on the Vulnerability of Secure Keypads for Mobile Devices
    Yunho Lee, Vol. 14, No. 3, pp. 15-22, Jun. 2013
    Keywords: Mobile Security, Secure Keypads, Personal Information, Keylogger
  5. 25. Research on Military SNS Protection Profile for National defense
    DeokHoon Yu, SeungJoo Kim, Vol. 14, No. 1, pp. 41-52, Feb. 2013
    Keywords: Military Security, Protection profile, social network service
  6. 26. OAuth based Proxy Delegation Service
    Daeyoung Heo, Suntae Hwang, Vol. 13, No. 6, pp. 55-62, Dec. 2012
    Keywords: X.509 Proxy Delegation, Grid Security, OAuth
  7. 27. The Important Factors in Security for Introducing the Cloud Services
    Young Bae Yoon, Junseok Oh, Bong Gyou Lee, Vol. 13, No. 6, pp. 33-40, Dec. 2012
    Keywords: Cloud Services, Security Importance, Ordered Logit Model
  8. 28. Development of Framework for Trusted Financial Service in N-Screen Environment
    Kyong-Jin Kim, Dong-Su Seo, Seng-Phil Hong, Vol. 13, No. 3, pp. 127-0, Jun. 2012
    Keywords: Framework, Financial services, Privacy, Security, Vulnerability
  9. 29. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing
  10. 30. Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments
    Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
    Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments