Digital Library
Search: "[ keyword: 인증 ]" (37)
-
Nakhoon Choi, Heeyoul Kim, Vol. 20, No. 6, pp. 119-127, Dec. 2019
10.7472/jksii.2019.20.6.119
Keywords: Blockchain, Ethereum, authentication, MetaMask, Personal Imformation, Decentralize -
Zhun Li, HyeYoung Lee, Youngjun Lee, Sooji Yoon, Byeongil Bae, Ho-Jin Choi, Vol. 20, No. 1, pp. 25-37, Feb. 2019
10.7472/jksii.2019.20.1.25
Keywords: Deep Learning, Handwriting Recognition, Writer Verification, Authentication System, One-time password, FIDO -
Gyu-Sung Ham, Own-jeong Seo, Hoill Jung, Su-Chong Joo, Vol. 19, No. 6, pp. 31-40, Dec. 2018
10.7472/jksii.2018.19.6.31
Keywords: Dynamic Situation Authentication Mechanism and Authentication System, Emergency Status Condition, Medical Information and Access Service, u-Medical Information System Environment -
Youn-chul Kang, Jong-chang Ahn, Vol. 19, No. 6, pp. 9-20, Dec. 2018
10.7472/jksii.2018.19.6.9
Keywords: Personal information security management system; Non-conformity trends; Business continuity management system; Certification audit; Information security management system; Control area -
Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
10.7472/jksii.2018.19.5.55
Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto -
16. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction TechnologyYounsung Choi, Dongho Won, Vol. 17, No. 3, pp. 1-10, Jun. 2016
10.7472/jksii.2016.17.3.01
Keywords: User authentication scheme, biometrics, fuzzy extraction -
Chang Won Jeong, Woo Hong Kim, Kwon Ha Yoon, Su Chong Joo, Vol. 16, No. 1, pp. 47-56, Feb. 2015
10.7472/jksii.2015.16.1.47
Keywords: Medical Information Dynamic Access System, Emergency Context Condition, Authorization Technology, Smart Mobile Environments -
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
10.7472/jksii.2015.16.1.21
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication -
Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
10.7472/jksii.2014.15.3.79
Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI -
Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
10.7472/jksii.2014.15.2.129
Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument