• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Protocol ]" (40)
  1. 1. Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data
  2. 2. Design and Implementation of a Secure Smart Home with a Residential Gateway
    Sang-kon Kim, Tae-kon Kim, Vol. 23, No. 2, pp. 9-17, Apr. 2022
    10.7472/jksii.2022.23.2.9
    Keywords: Secure Smart Home, Cryptographic Protocol, Residential Gateway, home automation
  3. 3. RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP
  4. 4. A Study on Workbench-based Dynamic Service De-sign and Construction of Computational Science Engineering Platform
    Yejin Kwon, Inho Jeon, Jin Ma, Sik Lee, Kum Won Cho, Jerry Seo, Vol. 19, No. 3, pp. 57-66, Jun. 2018
    10.7472/jksii.2018.19.3.57
    Keywords: Cloud computing, service portlet, workbench, Protocol, event processing
  5. 5. Privacy-Preserving DNA Matching Protocol
    Geontae Noh, Vol. 19, No. 2, pp. 1-7, Apr. 2018
    10.7472/jksii.2018.19.2.1
    Keywords: Privacy-Preserving Inner Product, DNA Matching Protocol
  6. 6. Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device
    Jong-ho Bang, Song-Yeon Lee, Jong-Ho Paik, Vol. 19, No. 1, pp. 19-26, Feb. 2018
    10.7472/jksii.2018.19.1.19
    Keywords: Sensor device, Bluetooth, Protocol, Internet of Thing, Smartphone application
  7. 7. Efficient Content Delivery Method in Wireless Content-Centric Network
    Chan-Min Park, Byung-Seo Kim, Vol. 18, No. 2, pp. 13-20, Apr. 2017
    10.7472/jksii.2017.18.2.13
    Keywords: Content-Centric Network, WIreless, Content, Protocol
  8. 8. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  9. 9. Hybrid Spray and Wait Routing Protocol in DTN
    Sung-Su Hyun, Hyeon-Jin Jeong, Seoung-Sik Choi, Vol. 15, No. 3, pp. 53-62, Jun. 2014
    10.7472/jksii.2014.15.3.53
    Keywords: DTN Protocol, Spray and Wait Protocol, One simulator
  10. 10. Development of Update Methods for Configuration Data of NETCONF Protocol considering Multiple Network Administrators
    Yang-Min Lee, Mi-Yang Cha, Jae-Kee Lee, Vol. 14, No. 5, pp. 27-38, Oct. 2013
    10.7472/jksii.2013.14.5.27
    Keywords: Manager Protocol, Operation layer, Content layer, Efficiency of operations, NETCONF Protocol