• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: authentication ]" (44)
  1. 21. Security Enhancing of Authentication Protocol for Hash Based RFID Tag
  2. 22. A Strong Anonymity Scheme for Wireless Sensor Networks
    Jung-Hyun Lee, Tae-Yeon Kim, Gi-Hwan Cho, Vol. 11, No. 3, pp. 139-0, Jun. 2010
    Keywords: Sensor network, Anonymity, hash chain, authentication
  3. 23. Secure Knowledge Management for Prevent illegal data leakage by Internal users
  4. 24. Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards
  5. 25. A Reliable 2-mode Authentication Framework for Wireless Sensor Network
  6. 26. e-Passport Integrated Authentication Mechanisms with Improved Efficiency
  7. 27. A Lightweight Authentication and Key Agreement Protocol in Wireless Sensor Networks
    Sin-Sook Yoon, Jae-Cheol Ha, Vol. 10, No. 2, pp. 41-52, Apr. 2009
    Keywords: authentication, key agreement, WSN
  8. 28. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  9. 29. Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication
    Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
    Keywords: Access Controls, authentication, internet security
  10. 30. RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates
    Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
    Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication