최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of computer and system sciences, v.86, 2017년, pp.59 - 69
Lee, J. , Seo, J.W. , Ko, H. , Kim, H.
Many cryptographic protocols were developed to support efficient group membership operations. Although those schemes can be extensively used for controlling temporary access with guest devices which do occur in many real world situations, those schemes incur a significant management overhead. For gu...
Garcia-Morchon 2013 Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks Securing the ip-based internet of things with hip and dtls
Hardjono 2004 The multicast group security architecture
J. Comput. Syst. Sci. Ramos 81 8 1452 2015 10.1016/j.jcss.2014.12.021 SAFIR: secure access framework for IoT-enabled services on smart buildings
Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the 7th ACM Conference on Computer and Communications Security.
Damiani 2009 New Directions in Intelligent Interactive Multimedia Systems and Services-2, vol. 2
J. Netw. Comput. Appl. Ogiela 38 34 2014 10.1016/j.jnca.2013.05.005 Cognitive systems and bio-inspired computing in homeland security
Ogiela 2008 International Conference on Security Technology Linguistic extension for secret sharing (m, n)-threshold schemes
S. Lucks, Design principles for iterated hash functions, IACR Cryptology ePrint Archive.
Secure hash standard, National Institute of Standards and Technology (NIST), FIPS 180-3.
Commun. ACM Lamport 24 11 770 1981 10.1145/358790.358797 Password authentification with insecure communication
Anderson 1996 Security Protocols Workshop Netcard - a practical electronic-cash system
N. Haller, The s/key one-time password system, RFC 1760, Internet Engineering Task Force.
Perrig 2001 Network and Distributed System Security Symposium Efficient and secure source authentication for multicast
Ogiela 2011 Advanced Computer Science and Information Technology Semantic analysis processes in advanced pattern understanding systems
Yum 2009 Topics in Cryptology-CT-RSA 2009 Single-layer fractal hash chain traversal with almost optimal complexity
Bellare 1993 Proceedings of the 1st ACM Conference on Computer and Communications Security Random oracles are practical: a paradigm for designing efficient protocols
J. ACM Canetti 51 4 557 2004 10.1145/1008731.1008734 The random oracle methodology
Inf. Sci. Li 214 56 2012 10.1016/j.ins.2012.06.001 Keyed hash function based on a dynamic lookup table of functions
Boyd 2013 Proceedings of the 18th European Conference on Research in Computer Security ASICS: authenticated key exchange security incorporating certification systems
Hummen 2014 IEEE International Conference on Sensing, Communication, and Networking Delegation-based authentication and authorization for the ip-based internet of things
Lee 2006 IEEE Consumer Communications and Networking Conference Guest access: change even your mother into an effective security technician
Miller 1988 Project Athena Technical Plan Kerberos authentication and authorization system
Hammer-Lahav 2010 The OAuth 1.0 Protocol
Kim 2007 4th IEEE Consumer Communications and Networking Conference N-times consumable digital ticket and its application to content access service
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.