Digital Library
Search: "[ keyword: Security ]" (69)
-
Daeyoung Heo, Suntae Hwang, Vol. 13, No. 6, pp. 55-62, Dec. 2012
10.7472/jksii.2012.13.6.55
Keywords: X.509 Proxy Delegation, Grid Security, OAuth -
Young Bae Yoon, Junseok Oh, Bong Gyou Lee, Vol. 13, No. 6, pp. 33-40, Dec. 2012
10.7472/jksii.2012.13.6.33
Keywords: Cloud Services, Security Importance, Ordered Logit Model -
Kyong-Jin Kim, Dong-Su Seo, Seng-Phil Hong, Vol. 13, No. 3, pp. 127-0, Jun. 2012
10.7472/jksii.2012.13.3.127
Keywords: Framework, Financial services, Privacy, Security, Vulnerability -
Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
10.7472/jksii.2012.13.2.59
Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing -
Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
10.7472/jksii.2012.13.2.51
Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments -
Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy -
Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
Keywords: Multicast Security, Group Key Management, Network Security -
Hyung-Woo Lee, Vol. 11, No. 6, pp. 73-86, Dec. 2010
Keywords: Integrated Event Log, Web Attack Detection, internet security -
49. Study of Document Distribution System Architecture for Digital Secret Document Leakage PreventionCheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution -
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model