• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: Security" (54)
  1. 31. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  2. 32. The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution
    Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
    Keywords: Multicast Security, Group Key Management, Network Security
  3. 33. Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data
    Hyung-Woo Lee, Vol. 11, No. 6, pp. 73-86, Dec. 2010
    Keywords: Integrated Event Log, Web Attack Detection, internet security
  4. 34. Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention
    Cheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
    Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution
  5. 35. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model
  6. 36. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  7. 37. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  8. 38. Design and Implementation of Grid-based PACS
    Jung-Su Kim, Se-Yul Lee, Jin-Sub Park, Bong-Hwan Lee, Vol. 9, No. 4, pp. 143-156, Aug. 2008
    Keywords: Distributed Computing, Grid, PACS, Security, Storage
  9. 39. Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication
    Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
    Keywords: Access Controls, authentication, internet security
  10. 40. RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates
    Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
    Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication