Digital Library
Search: "[ keyword: 인증 ]" (37)
-
Okkyung Choi, Wooyeol Jung, Bong Gyou Lee, Seungbin Moon, Vol. 15, No. 1, pp. 55-62, Feb. 2014
10.7472/jksii.2014.15.1.55
Keywords: Mobile Cloud Computing, Human-friendly Robot Service, User Authentication, Big Data Processing Technology, Log-data Analysis -
Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
10.7472/jksii.2013.14.4.43
Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack) -
Daeyoung Heo, Suntae Hwang, Vol. 13, No. 6, pp. 55-62, Dec. 2012
10.7472/jksii.2012.13.6.55
Keywords: X.509 Proxy Delegation, Grid Security, OAuth -
Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
10.7472/jksii.2012.13.2.51
Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments -
Aymen Abdullah Alsaffar, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh, Vol. 13, No. 2, pp. 21-32, Apr. 2012
10.7472/jksii.2012.13.2.21
Keywords: N-Screen Session Manager, Thin-Client, Cloud computing, SIP, authentication -
Seung-Hyun Lee, Dong-Ryeol Shin, Jong-Pil Jeong, Vol. 13, No. 1, pp. 15-26, Feb. 2012
10.7472/jksii.2012.13.1.15
Keywords: Proxyl, Mobile IPv6, forwarding, authentication -
Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy -
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model