• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: authentication ]" (44)
  1. 11. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  2. 12. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  3. 13. A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
  4. 14. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)
  5. 15. Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments
    Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
    10.7472/jksii.2012.13.2.51
    Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments
  6. 16. A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment
    Aymen Abdullah Alsaffar, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh, Vol. 13, No. 2, pp. 21-32, Apr. 2012
    10.7472/jksii.2012.13.2.21
    Keywords: N-Screen Session Manager, Thin-Client, Cloud computing, SIP, authentication
  7. 17. Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting
    Seung-Hyun Lee, Dong-Ryeol Shin, Jong-Pil Jeong, Vol. 13, No. 1, pp. 15-26, Feb. 2012
    10.7472/jksii.2012.13.1.15
    Keywords: Proxyl, Mobile IPv6, forwarding, authentication
  8. 18. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  9. 19. Vulnerability Assessment on the Secured USB Keyboard
  10. 20. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model