• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 인증 ]" (37)
  1. 21. A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
  2. 22. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)
  3. 23. OAuth based Proxy Delegation Service
    Daeyoung Heo, Suntae Hwang, Vol. 13, No. 6, pp. 55-62, Dec. 2012
    10.7472/jksii.2012.13.6.55
    Keywords: X.509 Proxy Delegation, Grid Security, OAuth
  4. 24. CR-SeMMS: Cost-Reduced Secure Mobility Management Scheme Based on SIP in NEMO Environments
    Chul-Hee Cho, Jong-Pil Jong, Vol. 13, No. 3, pp. 31-48, Jun. 2012
    10.7472/jksii.2012.13.3.31
  5. 25. Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments
    Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
    10.7472/jksii.2012.13.2.51
    Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments
  6. 26. A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment
    Aymen Abdullah Alsaffar, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh, Vol. 13, No. 2, pp. 21-32, Apr. 2012
    10.7472/jksii.2012.13.2.21
    Keywords: N-Screen Session Manager, Thin-Client, Cloud computing, SIP, authentication
  7. 27. Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting
    Seung-Hyun Lee, Dong-Ryeol Shin, Jong-Pil Jeong, Vol. 13, No. 1, pp. 15-26, Feb. 2012
    10.7472/jksii.2012.13.1.15
    Keywords: Proxyl, Mobile IPv6, forwarding, authentication
  8. 28. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  9. 29. An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks
    Ha-Gwon Jung, Jong-Pil Jeong, Vol. 12, No. 4, pp. 15-26, Aug. 2011
    Keywords: HMIPv6, MIPv6, Broker
  10. 30. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model