• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: authentication ]" (45)
  1. 41. Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting
    Seung-Hyun Lee, Dong-Ryeol Shin, Jong-Pil Jeong, Vol. 13, No. 1, pp. 15-26, Feb. 2012
    10.7472/jksii.2012.13.1.15
    Keywords: Proxyl, Mobile IPv6, forwarding, authentication
  2. 42. Efficient RFID Secure Protocol with Forward Secrecy
    Seong-Yun Kim, Ho-Won Kim, Vol. 12, No. 6, pp. 139-148, Dec. 2011
    Keywords: RFID Protocol, Security, Mutual Authentication, Forward Secrecy
  3. 43. Vulnerability Assessment on the Secured USB Keyboard
  4. 44. A Strong Anonymity Scheme for Wireless Sensor Networks
    Jung-Hyun Lee, Tae-Yeon Kim, Gi-Hwan Cho, Vol. 11, No. 3, pp. 139-0, Jun. 2010
    Keywords: Sensor network, Anonymity, hash chain, authentication
  5. 45. Secure Knowledge Management for Prevent illegal data leakage by Internal users