Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Jae-Kwang Lee"'
Publikováno v:
International Journal of Network Security & Its Applications. 9:1-12
Publikováno v:
Wireless Personal Communications. 90:1105-1120
A technique to induce access to a website falsely made through a message figured out as being sent by a trustworthy person or a simple spam, circulate a malicious code and cause additional security damage is called Phishing. According to security com
Publikováno v:
Journal of the Korea society of IT services. 14:197-215
Publikováno v:
Big Data, Cloud Computing, Data Science & Engineering ISBN: 9783319968025
As the number of IoT devices rapidly increases, research is actively conducted to manage data transmitted from a large number of devices. Various services such as monitoring service requesting IoT sensor data and real-time analysis processing service
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6f66aa9ba56e546447dfafd25cb2c90
https://doi.org/10.1007/978-3-319-96803-2_1
https://doi.org/10.1007/978-3-319-96803-2_1
Publikováno v:
Computational Science/Intelligence & Applied Informatics ISBN: 9783319968056
CSII (selected papers)
CSII (selected papers)
Amid the rapid expansion of smart devices including smartphone in our daily lives, more and more households have been adopting new forms of Smart Home services by linking home electronics with their smart devices. This kind of Smart Home services are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b47b1fac16241480d3b198f86eca7e5b
https://doi.org/10.1007/978-3-319-96806-3_10
https://doi.org/10.1007/978-3-319-96806-3_10
Publikováno v:
Journal of the Korea Institute of Information and Communication Engineering. 19:925-932
In this paper, by utilizing the iBeacon is BLE (BlueTooth Low Energy) protocol devices that are supported by over the Bluetooth 4.0, and have implemented a system to improve the accuracy in the system for measuring the position of the user. After mea
Publikováno v:
The Journal of Supercomputing. 72:1715-1739
In this paper, security vulnerabilities that can be found in hybrid apps, by which important data are downloaded from a web server, were analyzed and HIGHT algorithm based on OTP delimiter modification and bit slicing was proposed to enhance security
Publikováno v:
SAE Technical Paper Series.
Publikováno v:
Computer Science & Information Technology ( CS & IT ).
Publikováno v:
The Journal of Digital Policy and Management. 11:415-420
U-WHS refers to a means of remote health monitoring service to combine fitness with wellbing. U-WHS is a system which can measure and manage biometric information of patients without any limitation on time and space. In this paper, we performed in or