• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 인증 ]" (37)
  1. 11. A Blockchain-based User Authentication Model Using MetaMask
    Nakhoon Choi, Heeyoul Kim, Vol. 20, No. 6, pp. 119-127, Dec. 2019
    10.7472/jksii.2019.20.6.119
    Keywords: Blockchain, Ethereum, authentication, MetaMask, Personal Imformation, Decentralize
  2. 12. Handwritten One-time Password Authentication SystemBased On Deep Learning
  3. 13. Implementation of Dynamic Situation Authentication System for Accessing Medical Information
  4. 14. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations
  5. 15. Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation
    Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
    10.7472/jksii.2018.19.5.55
    Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto
  6. 16. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology
    Younsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
    10.7472/jksii.2016.17.3.01
    Keywords: User authentication scheme, biometrics, fuzzy extraction
  7. 17. Medical Information Dynamic Access System in Smart Mobile Environments
  8. 18. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  9. 19. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  10. 20. A Study on Smart card-based Security Mechanisms of upgrades Smart Meter SW for secure deployment in Smart Grid
    Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
    10.7472/jksii.2014.15.2.129
    Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument