Digital Library
Search: "[ keyword: Session ]" (7)
Error Control Protocol and Data Encryption Mechanism in the One-Way Network
Jaecheol Ha,
Kihyun Kim,
Vol. 26, No. 3, pp. 613-622,
Jun.
2016
10.13089/JKIISC.2016.26.3.613
Keywords: One-Way Network, Error Control Method, Data encryption, Session Key Updating

Keywords: One-Way Network, Error Control Method, Data encryption, Session Key Updating
Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN
Jin-Ho Choi,
Soohyun Oh,
Vol. 22, No. 6, pp. 1219-1230,
Dec.
2012
10.13089/JKIISC.2012.22.6.1219
Keywords: WEP, WPA, PSK Cracking, Session Hijacking

Keywords: WEP, WPA, PSK Cracking, Session Hijacking
Improved Group Key Exchange Scheme Secure Against Session-State Reveal Attacks
Ki-Tak Kim,
Jeong-Ok Kwon,
Do-Won Hong,
Dong-Hoon Lee,
Vol. 18, No. 3, pp. 3-8,
Jun.
2008
10.13089/JKIISC.2008.18.3.3
Keywords: Group key agreement, session-state reveal attack, implicit key authentication, Forward Secrecy, known key security

Keywords: Group key agreement, session-state reveal attack, implicit key authentication, Forward Secrecy, known key security
An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions
Young-Jae Maeng,
Dae-Hun Nyang,
Vol. 18, No. 1, pp. 103-114,
Feb.
2008
10.13089/JKIISC.2008.18.1.103
Keywords: Single Sign-On, Cookie, Session, Replay Attack, Hypertext Transfer Protocol

Keywords: Single Sign-On, Cookie, Session, Replay Attack, Hypertext Transfer Protocol
A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS
Young-Gyo Lee,
Jung-Hyun Nam,
Jee-Yeon Kim,
Seung-Joo Kim,
Dong-Ho Won,
Vol. 15, No. 4, pp. 83-92,
Aug.
2005
10.13089/JKIISC.2005.15.4.83
Keywords: D-OCSP-KIS, OCSP Responder, D-OCSP, session private key

Keywords: D-OCSP-KIS, OCSP Responder, D-OCSP, session private key
Real-Time Visualization of Web Usage Patterns and Anomalous Sessions
,
,
,
Vol. 14, No. 4, pp. 97-110,
Aug.
2004
10.13089/JKIISC.2004.14.4.97
Keywords: web visualization, Anomaly Detection, web usage pattern, anomalous sessions, visualization principles, SAD viewer, DoS attack, Code-Red worm, Whisker scans

Keywords: web visualization, Anomaly Detection, web usage pattern, anomalous sessions, visualization principles, SAD viewer, DoS attack, Code-Red worm, Whisker scans
Category Search
Publications
-
Vol. 35, 2025
-
Vol. 34, 2024
-
Vol. 33, 2023
-
Vol. 32, 2022
-
Vol. 31, 2021
-
Vol. 30, 2020
-
Vol. 29, 2019
-
Vol. 28, 2018
-
Vol. 27, 2017
-
Vol. 26, 2016
-
Vol. 25, 2015
-
Vol. 24, 2014
-
Vol. 23, 2013
-
Vol. 22, 2012
-
Vol. 21, 2011
-
Vol. 20, 2010
-
Vol. 19, 2009
-
Vol. 18, 2008
-
Vol. 17, 2007
-
Vol. 16, 2006
-
Vol. 15, 2005
-
Vol. 14, 2004
-
Vol. 13, 2003
-
Vol. 12, 2002
-
Vol. 11, 2001
-
Vol. 10, 2000
-
Vol. 9, 1999
-
Vol. 8, 1998
-
Vol. 7, 1997
-
Vol. 6, 1996
-
Vol. 5, 1995
-
Vol. 4, 1994
-
Vol. 2, 1992
-
Vol. 1, 1991