• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 보안 ]" (58)
  1. 21. Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments
    Chang-Won Jeong, Jae-Hyeong Choi, Su-Chong Joo, Vol. 13, No. 2, pp. 51-58, Apr. 2012
    10.7472/jksii.2012.13.2.51
    Keywords: Context-Aware Authentication, Android security platform, u-Hospital environments
  2. 22. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  3. 23. The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution
    Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
    Keywords: Multicast Security, Group Key Management, Network Security
  4. 24. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model
  5. 25. Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention
    Cheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
    Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution
  6. 26. A Property-Based Data Sealing using the Weakest Precondition Concept
    Tae-Jin Park, Jun-Cheol Park, Vol. 9, No. 6, pp. 1-14, Dec. 2008
    Keywords: TPM(Trusted Platform Module), Trusted Computing
  7. 27. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  8. 28. A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare
  9. 29. A Design and Implementation of Information Security Management and Audit System for Government Agencies
    Yong-Joon Jun, Gi-Hwan Cho, Won-Kyu Kim, Vol. 7, No. 5, pp. 81-94, Oct. 2006
    Keywords: BS7799, ISMS, Control Object
  10. 30. Research on the Security Intelligence & Regulation Enforcement Network(SIREN) Model with RAG
    JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
    10.7472/jksii.2025.26.3.135
    Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence