Digital Library


Search: "[ keyword: Authentication Protocol ]" (27)
    A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks
    , Vol. 29, No. 4, pp. 729-738, Aug. 2019
    10.13089/JKIISC.2019.29.4.729

    POSCAL : A Protocol of Service Access Control by Authentication Level
    유성민, 최석진, 박준후, 류재철, Vol. 28, No. 6, pp. 1509-1522, Nov. 2018
    10.13089/JKIISC.2018.28.6.1509
    Keywords: Authentication Protocol, access control, biometrics, FinTech, e-Wallet, Authentication framework, Authentication Protocol, access control, biometrics, FinTech, e-Wallet, Authentication framework

    A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments
    Won-il Bae, Jin Kwak, Vol. 27, No. 2, pp. 329-342, Apr. 2017
    10.13089/JKIISC.2017.27.2.329
    Keywords: Multi-Server Architecture, smart card, Authentication Protocol

    Digital Legal Seal for Message Authentication Code
    ChangHun Jung, DongOh Shin, RhongHo Jang, DaeHun Nyang, KyungHee Lee, Heung-Youl Youm, Vol. 26, No. 2, pp. 345-358, Apr. 2016
    10.13089/JKIISC.2016.26.2.345
    Keywords: Authentication Protocol, Hash-based Message Authentication Code, Digital Legal Seal, Online Banking, Promissory Note

    Study of Biometrics using Tritone Paradox
    Changhoon Jung, DongOh Shin, DaeHun Nyang, KyungHee Lee, Vol. 25, No. 5, pp. 1085-1096, Oct. 2015
    10.13089/JKIISC.2015.25.5.1085
    Keywords: biometrics, Tritone Paradox, Authentication Protocol, Auditory Sense

    Design of Improved Authentication Protocol for Sensor Networks in IoT Environment
    Deuk-Hun Kim, Jin Kwak, Vol. 25, No. 2, pp. 467-478, Apr. 2015
    10.13089/JKIISC.2015.25.2.467
    Keywords: Internet of Things, Authentication Protocol, sensor networks, Security, Impersonation attack

    A Study on Efficient Design of PUF-Based RFID Authentication Protocol
    Jin Wook Byun, Vol. 24, No. 5, pp. 987-1000, Oct. 2014
    10.13089/JKIISC.2014.24.5.987
    Keywords: RFID authentication, PUF, Authentication Protocol

    Closest Vector Problem Based Interactive Proof
    Kyunghee Lee, DaeHun Nyang, Vol. 22, No. 6, pp. 1265-1270, Dec. 2012
    10.13089/JKIISC.2012.22.6.1265
    Keywords: Closest Vector Problem, Interactive Proof, Authentication Protocol

    A Study of Patient's Privacy Protection in U-Healthcare
    Yoon-Su Jeong, Sang-Ho Lee, Vol. 22, No. 4, pp. 913-922, Aug. 2012
    10.13089/JKIISC.2012.22.4.913
    Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification

    User Authentication Protocol through Distributed Process for Cloud Environment
    Yoon-Su Jeong, Sang-Ho Lee, Vol. 22, No. 4, pp. 841-850, Aug. 2012
    10.13089/JKIISC.2012.22.4.841
    Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification