Digital Library
Search: "[ keyword: Security ]" (82)
-
Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication -
Seng-Phil Hong, Hyun-Me Jang, Vol. 9, No. 2, pp. 51-60, Apr. 2008
Keywords: Privacy, Security, Policy, access control, Security Architecture -
Da-hyeon Kim, Ji-young Min, Jun-ho Ahn, Vol. 23, No. 6, pp. 27-37, Dec. 2022
10.7472/jksii.2022.23.6.27
Keywords: Virtual Private Network, STRIDE Threat Modeling, Threat Analysis, Threat Scenario, Security requirement -
Kook-jin Kim, Jae-pil Youn, Suk-joon Yoon, Ji-won Kang, Kyung-shin Kim, Dong-kyoo Shin, Vol. 23, No. 5, pp. 87-101, Oct. 2022
10.7472/jksii.2022.23.5.87
Keywords: cybersecurity, Cyber Command & Control, Cyberspace, Cyber Operation, Cyber Situational Awareness, Cyber Common Operational Picture -
Junhyeok Yun, Mihui Kim, Vol. 23, No. 4, pp. 95-107, Aug. 2022
10.7472/jksii.2022.23.4.95
Keywords: Internet of Things, Information System, Network Security, Big-Data -
Min-goo Kang, Vol. 23, No. 4, pp. 65-72, Aug. 2022
10.7472/jksii.2022.23.4.65
Keywords: Passwordless security, Multi-Factor Authentication(MFA), Zero Trust, FIDO transaction, Secondary user authentication -
Kook-jin Kim, Seung-hwan Oh, Dong-hwan Lee, Haeng-rok Oh, Jung-sik Lee, Dong-kyoo Shin, Vol. 22, No. 6, pp. 115-127, Dec. 2021
10.7472/jksii.2021.22.6.115
Keywords: Cyber Operation, Cyber Target, Cyber Security, Pagerank Algorithm -
48. The direction of application of the RMF-based risk management system considering interoperabilityHyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
10.7472/jksii.2021.22.6.83
Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF -
Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
10.7472/jksii.2021.22.6.71
Keywords: cybersecurity test and evaluation -
Jaedong Jang, Mingi Cho, Yezee Seo, Seyeon Jeong, Taekyoung Kwon, Vol. 21, No. 2, pp. 109-119, Apr. 2020
10.7472/jksii.2020.21.2.109
Keywords: FPGA, Hardware Security, Hardware Trojan