Digital Library
Search: "[ keyword: authentication ]" (44)
-
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
10.7472/jksii.2015.16.1.21
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication -
Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
10.7472/jksii.2014.15.3.79
Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI -
Okkyung Choi, Wooyeol Jung, Bong Gyou Lee, Seungbin Moon, Vol. 15, No. 1, pp. 55-62, Feb. 2014
10.7472/jksii.2014.15.1.55
Keywords: Mobile Cloud Computing, Human-friendly Robot Service, User Authentication, Big Data Processing Technology, Log-data Analysis -
Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
10.7472/jksii.2013.14.4.43
Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack) -
Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
10.7472/jksii.2012.13.2.51
Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments -
Aymen Abdullah Alsaffar, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh, Vol. 13, No. 2, pp. 21-32, Apr. 2012
10.7472/jksii.2012.13.2.21
Keywords: N-Screen Session Manager, Thin-Client, Cloud computing, SIP, authentication -
Seung-Hyun Lee, Dong-Ryeol Shin, Jong-Pil Jeong, Vol. 13, No. 1, pp. 15-26, Feb. 2012
10.7472/jksii.2012.13.1.15
Keywords: Proxyl, Mobile IPv6, forwarding, authentication -
Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy -
Kyung-Roul Lee, Kang-Bin Yim, Vol. 12, No. 5, pp. 39-46, Oct. 2011
Keywords: USB keyboard, Vulnerability Assessment, secure keyboard software, keyboard sniffing, password authentication -
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model