• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (69)
  1. 41. OAuth based Proxy Delegation Service
    Daeyoung Heo, Suntae Hwang, Vol. 13, No. 6, pp. 55-62, Dec. 2012
    10.7472/jksii.2012.13.6.55
    Keywords: X.509 Proxy Delegation, Grid Security, OAuth
  2. 42. The Important Factors in Security for Introducing the Cloud Services
    Young Bae Yoon, Junseok Oh, Bong Gyou Lee, Vol. 13, No. 6, pp. 33-40, Dec. 2012
    10.7472/jksii.2012.13.6.33
    Keywords: Cloud Services, Security Importance, Ordered Logit Model
  3. 43. Development of Framework for Trusted Financial Service in N-Screen Environment
    Kyong-Jin Kim, Dong-Su Seo, Seng-Phil Hong, Vol. 13, No. 3, pp. 127-0, Jun. 2012
    10.7472/jksii.2012.13.3.127
    Keywords: Framework, Financial services, Privacy, Security, Vulnerability
  4. 44. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    10.7472/jksii.2012.13.2.59
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing
  5. 45. Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments
    Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
    10.7472/jksii.2012.13.2.51
    Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments
  6. 46. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  7. 47. The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution
    Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
    Keywords: Multicast Security, Group Key Management, Network Security
  8. 48. Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data
    Hyung-Woo Lee, Vol. 11, No. 6, pp. 73-86, Dec. 2010
    Keywords: Integrated Event Log, Web Attack Detection, internet security
  9. 49. Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention
    Cheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
    Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution
  10. 50. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model