• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 프로토콜 ]" (18)
  1. 1. RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP
  2. 2. A Study on Workbench-based Dynamic Service De-sign and Construction of Computational Science Engineering Platform
    Yejin Kwon, Inho Jeon, Jin Ma, Sik Lee, Kum Won Cho, Jerry Seo, Vol. 19, No. 3, pp. 57-66, Jun. 2018
    10.7472/jksii.2018.19.3.57
    Keywords: Cloud computing, service portlet, workbench, Protocol, event processing
  3. 3. Privacy-Preserving DNA Matching Protocol
    Geontae Noh, Vol. 19, No. 2, pp. 1-7, Apr. 2018
    10.7472/jksii.2018.19.2.1
    Keywords: Privacy-Preserving Inner Product, DNA Matching Protocol
  4. 4. Efficient Content Delivery Method in Wireless Content-Centric Network
    Chan-Min Park, Byung-Seo Kim, Vol. 18, No. 2, pp. 13-20, Apr. 2017
    10.7472/jksii.2017.18.2.13
    Keywords: Content-Centric Network, WIreless, Content, Protocol
  5. 5. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  6. 6. Hybrid Spray and Wait Routing Protocol in DTN
    Sung-Su Hyun, Hyeon-Jin Jeong, Seoung-Sik Choi, Vol. 15, No. 3, pp. 53-62, Jun. 2014
    10.7472/jksii.2014.15.3.53
    Keywords: DTN Protocol, Spray and Wait Protocol, One simulator
  7. 7. Development of Update Methods for Configuration Data of NETCONF Protocol considering Multiple Network Administrators
    Yang-Min Lee, Mi-Yang Cha, Jae-Kee Lee, Vol. 14, No. 5, pp. 27-38, Oct. 2013
    10.7472/jksii.2013.14.5.27
    Keywords: Manager Protocol, Operation layer, Content layer, Efficiency of operations, NETCONF Protocol
  8. 8. Adaptive RFID anti-collision scheme using collision information and m-bit identification
    Je-Yul Lee, Jongmin Shin, Dongmin Yang, Vol. 14, No. 5, pp. 1-10, Oct. 2013
    10.7472/jksii.2013.14.5.01
    Keywords: RFID, Anti-collision, M-ary Query Tree Protocol
  9. 9. Cost Analysis of Mobility Management Schemes for IP-based Next Generation Mobile Networks
    Kyung-Tae Kim, Jong-Pil Jeong, Vol. 13, No. 3, pp. 1-16, Jun. 2012
    10.7472/jksii.2012.13.3.1
    Keywords: PIMPv6, F-PMIPv6, MIPv6, Mobility Management
  10. 10. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy