• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 인증 ]" (37)
  1. 11. An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks
    Ha-Gwon Jung, Jong-Pil Jeong, Vol. 12, No. 4, pp. 15-26, Aug. 2011
    Keywords: HMIPv6, MIPv6, Broker
  2. 12. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model
  3. 13. Security Enhancing of Authentication Protocol for Hash Based RFID Tag
  4. 14. A Strong Anonymity Scheme for Wireless Sensor Networks
    Jung-Hyun Lee, Tae-Yeon Kim, Gi-Hwan Cho, Vol. 11, No. 3, pp. 139-0, Jun. 2010
    Keywords: Sensor network, Anonymity, hash chain, authentication
  5. 15. Secure Knowledge Management for Prevent illegal data leakage by Internal users
  6. 16. A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity
    Yi-Roo Baek, Kwang-Eun Gil, Jae-Cheol Ha, Vol. 10, No. 6, pp. 229-0, Dec. 2009
  7. 17. Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards
  8. 18. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  9. 19. A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment
    Soon-Ja Hong, Yong-Wan Koo, Vol. 7, No. 5, pp. 33-42, Oct. 2006
    Keywords: WPKI, Rooming Server, Pre-Authentication
  10. 20. A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity
    Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
    10.7472/jksii.2024.25.1.123
    Keywords: Cybersecurity Audit, Compliance, RMF, CMMC