Digital Library
Search: "[ keyword: authentication ]" (45)
-
Jin-Oh Jeon, Min-Sup Kang, Vol. 11, No. 4, pp. 23-32, Aug. 2010
Keywords: three-way authentication protocol, SHA-1 hash algorithm, RFID Tag, three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design -
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model -
Hee-Won Shim, Joonn-Hyung Park, Bong-Nam Noh, Vol. 10, No. 4, pp. 223-0, Aug. 2009
Keywords: smartcard, Dynamic ID, authentication, Mutual Authentication, realtime replay -
Nguyen Thi Thanh Huyen, Eui-Nam Huh, Vol. 10, No. 3, pp. 51-60, Jun. 2009
Keywords: reliable 2-mode authentication, probabilistic key pre-distribution, Wireless Sensor Network, trust, cluster -
Dong-Bum Lee, Woong Go, Jin Kwak, Vol. 10, No. 2, pp. 53-64, Apr. 2009
Keywords: e-Passport, authentication, Key agreement protocol, Inspection system -
Sin-Sook Yoon, Jae-Cheol Ha, Vol. 10, No. 2, pp. 41-52, Apr. 2009
Keywords: authentication, key agreement, WSN -
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho, Vol. 9, No. 6, pp. 63-72, Dec. 2008
Keywords: Ubiquitous Environment, Heterogeneous Network Security, Secure Network Management, User Authentication -
Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
Keywords: Access Controls, authentication, internet security -
Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication -
Mi-Jin Kim, Jung-Hyun Nam, Dong-Ho Won, Vol. 9, No. 2, pp. 83-88, Apr. 2008
Keywords: session initiation protocol, authentication, Key Exchange, Dictionary Attack, Forward Secrecy