• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: authentication ]" (45)
  1. 1. Security Enhancing of Authentication Protocol for Hash Based RFID Tag
  2. 2. An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment
    Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
    Keywords: Computer Forensics, integrity, authentication, Security Model
  3. 3. Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards
  4. 4. A Reliable 2-mode Authentication Framework for Wireless Sensor Network
  5. 5. e-Passport Integrated Authentication Mechanisms with Improved Efficiency
  6. 6. A Lightweight Authentication and Key Agreement Protocol in Wireless Sensor Networks
    Sin-Sook Yoon, Jae-Cheol Ha, Vol. 10, No. 2, pp. 41-52, Apr. 2009
    Keywords: authentication, key agreement, WSN
  7. 7. A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
  8. 8. Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication
    Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
    Keywords: Access Controls, authentication, internet security
  9. 9. RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates
    Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
    Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication
  10. 10. Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme