• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: authentication ]" (44)
  1. 1. FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication
    Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
    10.7472/jksii.2022.23.4.65
    Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication
  2. 2. A Study on Medical Information Platform Based on Big Data Processing and Edge Computing for Supporting Automatic Authentication in Emergency Situations
  3. 3. Study on Threshold Scheme based Secure Secret Sharing P2P System
    Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
    10.7472/jksii.2022.23.3.21
    Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication
  4. 4. Development of Authentication Service Model Based Context-Awareness for Accessing Patient’s Medical Information
  5. 5. Implementation of An Automatic Authentication System Based on Patient’s Situations and Its Performance Evaluation
  6. 6. A Blockchain-based User Authentication Model Using MetaMask
    Nakhoon Choi, Heeyoul Kim, Vol. 20, No. 6, pp. 119-127, Dec. 2019
    10.7472/jksii.2019.20.6.119
    Keywords: Blockchain, Ethereum, authentication, MetaMask, Personal Imformation, Decentralize
  7. 7. Handwritten One-time Password Authentication SystemBased On Deep Learning
  8. 8. Implementation of Dynamic Situation Authentication System for Accessing Medical Information
  9. 9. Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation
    Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
    10.7472/jksii.2018.19.5.55
    Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto
  10. 10. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology
    Younsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
    10.7472/jksii.2016.17.3.01
    Keywords: User authentication scheme, biometrics, fuzzy extraction