Digital Library
Search: "[ keyword: 인증 ]" (37)
-
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model -
Jin-Oh Jeon, Min-Sup Kang, Vol. 11, No. 4, pp. 23-32, Aug. 2010
Keywords: three-way authentication protocol, SHA-1 hash algorithm, RFID Tag, three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design -
Jung-Hyun Lee, Tae-Yeon Kim, Gi-Hwan Cho, Vol. 11, No. 3, pp. 139-0, Jun. 2010
Keywords: Sensor network, Anonymity, hash chain, authentication -
Dae-Hee Seo, Jang-Mi Baek, Min-Kyung Lee, Mi-Yeon Yoon, Dong-Sub Cho, Vol. 11, No. 2, pp. 73-84, Apr. 2010
Keywords: Ubiquitous Computing, Knowledge Management System, Prevent illegal data leakage, access control, authentication -
Hee-Won Shim, Joonn-Hyung Park, Bong-Nam Noh, Vol. 10, No. 4, pp. 223-0, Aug. 2009
Keywords: smartcard, Dynamic ID, authentication, Mutual Authentication, realtime replay -
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho, Vol. 9, No. 6, pp. 63-72, Dec. 2008
Keywords: Ubiquitous Environment, Heterogeneous Network Security, Secure Network Management, User Authentication -
Soon-Ja Hong, Yong-Wan Koo, Vol. 7, No. 5, pp. 33-42, Oct. 2006
Keywords: WPKI, Rooming Server, Pre-Authentication -
Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
10.7472/jksii.2024.25.1.123
Keywords: Cybersecurity Audit, Compliance, RMF, CMMC