Digital Library
Search: "[ keyword: Security ]" (75)
-
Jung-Gyu Lee, Seung-Ryul Jeong, Vol. 18, No. 5, pp. 113-121, Oct. 2017
10.7472/jksii.2017.18.5.113
Keywords: Dashboard, Key Performance Indicator, Vulnerability, Service Performance, internet security -
Daewon Hong, Miju Kang, Junchul Chun, Vol. 18, No. 5, pp. 87-94, Oct. 2017
10.7472/jksii.2017.18.5.87
Keywords: digital certification, Digital Jikin, image processing, Data security, Android Application, Smartphone -
3. Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet BankingHye-Seung Park, Jae-Hyup Lee, Seung-Chul Park, Vol. 18, No. 4, pp. 69-78, Aug. 2017
10.7472/jksii.2017.18.4.69
Keywords: Internet banking, banking security, NPKI banking, open banking -
Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek;, Vol. 18, No. 2, pp. 31-42, Apr. 2017
10.7472/jksii.2017.18.2.31
Keywords: Internet Banking Service, Security Techniques, Technical classification, Financial institution area, Network communication area -
Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
10.7472/jksii.2017.18.1.105
Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS -
Sung-Sam Hong, Dong-Wook Kim, Byungik Kim, Myung-Mook Han, Vol. 18, No. 1, pp. 65-76, Feb. 2017
10.7472/jksii.2017.18.1.65
Keywords: Labeling, Detection Model based on classification, Data Mining, Inference, Supervised/Unsupervised Learning, Security -
Chang-Won Jeong, Dong-Ho Kim, Myung-Hee Kim, Su-Chong Joo, Vol. 8, No. 6, pp. 29-42, Dec. 2007
Keywords: dynamic security service, access control model, Distributed Object Group Framework -
Min-Gyu Kim, Si-Yong Park, Bong-Hwan Lee, Vol. 8, No. 3, pp. 85-98, Jun. 2007
Keywords: Distributed Computing, Grid Security, Mobile Grid, e-Healthcare -
Seng-Phil Hong, Jae-Hyoun Kim, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business -
Kim Sang-Kyun, Lee Hong-Joo, Vol. 7, No. 3, pp. 93-106, Jun. 2006
Keywords: Instant messenger, Risk Analysis, Security Management