Digital Library
Search: "[ keyword: Authentication Protocol ]" (27)
POSCAL : A Protocol of Service Access Control by Authentication Level
유성민,
최석진,
박준후,
류재철,
Vol. 28, No. 6, pp. 1509-1522,
Nov.
2018
10.13089/JKIISC.2018.28.6.1509
Keywords: Authentication Protocol, access control, biometrics, FinTech, e-Wallet, Authentication framework, Authentication Protocol, access control, biometrics, FinTech, e-Wallet, Authentication framework
10.13089/JKIISC.2018.28.6.1509
Keywords: Authentication Protocol, access control, biometrics, FinTech, e-Wallet, Authentication framework, Authentication Protocol, access control, biometrics, FinTech, e-Wallet, Authentication framework
A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments
Won-il Bae,
Jin Kwak,
Vol. 27, No. 2, pp. 329-342,
Apr.
2017
10.13089/JKIISC.2017.27.2.329
Keywords: Multi-Server Architecture, smart card, Authentication Protocol
10.13089/JKIISC.2017.27.2.329
Keywords: Multi-Server Architecture, smart card, Authentication Protocol
Digital Legal Seal for Message Authentication Code
ChangHun Jung,
DongOh Shin,
RhongHo Jang,
DaeHun Nyang,
KyungHee Lee,
Heung-Youl Youm,
Vol. 26, No. 2, pp. 345-358,
Apr.
2016
10.13089/JKIISC.2016.26.2.345
Keywords: Authentication Protocol, Hash-based Message Authentication Code, Digital Legal Seal, Online Banking, Promissory Note
10.13089/JKIISC.2016.26.2.345
Keywords: Authentication Protocol, Hash-based Message Authentication Code, Digital Legal Seal, Online Banking, Promissory Note
Study of Biometrics using Tritone Paradox
Changhoon Jung,
DongOh Shin,
DaeHun Nyang,
KyungHee Lee,
Vol. 25, No. 5, pp. 1085-1096,
Oct.
2015
10.13089/JKIISC.2015.25.5.1085
Keywords: biometrics, Tritone Paradox, Authentication Protocol, Auditory Sense
10.13089/JKIISC.2015.25.5.1085
Keywords: biometrics, Tritone Paradox, Authentication Protocol, Auditory Sense
Design of Improved Authentication Protocol for Sensor Networks in IoT Environment
Deuk-Hun Kim,
Jin Kwak,
Vol. 25, No. 2, pp. 467-478,
Apr.
2015
10.13089/JKIISC.2015.25.2.467
Keywords: Internet of Things, Authentication Protocol, sensor networks, Security, Impersonation attack
10.13089/JKIISC.2015.25.2.467
Keywords: Internet of Things, Authentication Protocol, sensor networks, Security, Impersonation attack
A Study on Efficient Design of PUF-Based RFID Authentication Protocol
Jin Wook Byun,
Vol. 24, No. 5, pp. 987-1000,
Oct.
2014
10.13089/JKIISC.2014.24.5.987
Keywords: RFID authentication, PUF, Authentication Protocol
10.13089/JKIISC.2014.24.5.987
Keywords: RFID authentication, PUF, Authentication Protocol
Closest Vector Problem Based Interactive Proof
Kyunghee Lee,
DaeHun Nyang,
Vol. 22, No. 6, pp. 1265-1270,
Dec.
2012
10.13089/JKIISC.2012.22.6.1265
Keywords: Closest Vector Problem, Interactive Proof, Authentication Protocol
10.13089/JKIISC.2012.22.6.1265
Keywords: Closest Vector Problem, Interactive Proof, Authentication Protocol
A Study of Patient's Privacy Protection in U-Healthcare
Yoon-Su Jeong,
Sang-Ho Lee,
Vol. 22, No. 4, pp. 913-922,
Aug.
2012
10.13089/JKIISC.2012.22.4.913
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
10.13089/JKIISC.2012.22.4.913
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
User Authentication Protocol through Distributed Process for Cloud Environment
Yoon-Su Jeong,
Sang-Ho Lee,
Vol. 22, No. 4, pp. 841-850,
Aug.
2012
10.13089/JKIISC.2012.22.4.841
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
10.13089/JKIISC.2012.22.4.841
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification