• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CC ]" (102)
  1. 21. A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECC
    Jeong Eun-Hee, Lee Byung-Kwan, Vol. 6, No. 3, pp. 1-16, Jun. 2005
    Keywords: SSL, DES, ECC, MDIT, EC-Sign, 3BC
  2. 22. Interactive Facial Expression Animation of Motion Data using CCA
  3. 23. Security-intensified SSL VPN and WLCAPT Virtual Server Design
    Jeong Eun-Hee, Choi Eun-Sil, Lee Byung-Kwan, Vol. 5, No. 6, pp. 45-58, Dec. 2004
    Keywords: SSL, VPN, ECC, WLCAPT, ECSPK
  4. 24. A Assumptions Statement Generation Method for Security Environment of Protection Profile
  5. 25. Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack
    Lee Hyung-Woo, Vol. 5, No. 1, pp. 85-98, Feb. 2004
    Keywords: DDoS, Traceback, ICMP, ACC, Pushback
  6. 26. A Study on the Localized Key Management Using AAA in Mobile IPv6
  7. 27. A fuzzy ART Approach for IS Personnel Selection and Evaluation
  8. 28. A Web Accessability Compliance Framework for Website Development: A Case of W Bank Internet Banking Project -
    Yoosin Kim, Seung Ryul Jeong, Vol. 14, No. 5, pp. 87-100, Oct. 2013
    10.7472/jksii.2013.14.5.87
    Keywords: Web Accessability, Web Accessability Compliance, Website Development Methodology
  9. 29. A study on Factors that Influence the Usage of Mobile Apps - Based on Flow Theory and Unified Theory of Acceptance and Use of Technology -
    Young-Chae Kim, Seung Ryul Jeong, Vol. 14, No. 4, pp. 73-84, Aug. 2013
    10.7472/jksii.2013.14.4.73
    Keywords: Mobile App, Flow Experience, Flow Theory, Technology Acceptance, Usage
  10. 30. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)