Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Woongryul Jeon"'
Publikováno v:
Sensors, Vol 14, Iss 4, Pp 6443-6462 (2014)
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have be
Externí odkaz:
https://doaj.org/article/ac83e67dd47146ed9e24421d13d4b45d
Publikováno v:
Jurnal Ilmu Komputer dan Informasi, Vol 6, Iss 1, Pp 6-10 (2013)
In recent years, the number of subscribers of the social network services such as Facebook and Twitter has increased rapidly. In accordance with the increasing popularity of social network services, concerns about user privacy are also growing. Exist
Externí odkaz:
https://doaj.org/article/052938920e7b451182203798403ab345
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 24:373-384
The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users ma
Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 24:59-74
The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information.
Publikováno v:
International Journal of Security and Its Applications. 7:343-354
Home network service is recently installed in each home with the popularity of ubiquitous environment. There are being developed systems that efficiently controlled and handling home entry, electricity product, lamp and boiler at the remote environme
Publikováno v:
IEICE Transactions on Communications. :2505-2508
Autor:
Hyunseung Lee, Kwangwoo Lee, Dongho Won, Sungkyu Cho, Woongryul Jeon, Young-jun Cho, Hyoungseob Lee, Songyi Kim, Hyunsang Park, Wook-jae Cha, Seungjoo Kim
Publikováno v:
The KIPS Transactions:PartC. :461-476
Digital Printers that are mainly used in enterprises and public institutions are compound machinery and tools which are combined into various functions such as printing, copying, scanning, and fax so on. Digital Printers has security functionality fo
Publikováno v:
Archives of Virology. 153:2019-2025
We evaluated the usefulness of dual priming oligonucleotide (DPO)-based multiplex PCR, Seeplex HBV Lami-DR assay (Seegene Institute of Life Sciences, Seoul, Korea), to detect lamivudine-resistant HBV mutants in a comparison with the use of TRUGENE™
Publikováno v:
ICUIMC
Remote User authentication scheme is widely used for communication between authorized remote users over insecure network. In 2010, Manoj Kumar proposed a new secure remote user authentication scheme with smart cards. He claimed that the protocol was
Publikováno v:
ICUIMC
Recently, SSD sales are on the steady rise. The reason of sales is that SSD is faster and smaller than HDD. Therefore SSD serves as a typical alternative to HDD. In fact, SSD considerably emulates the technology of HDD such as the communication proto