Digital Library


Search: "[ keyword: Authentication ]" (102)
    Implementation of a Secure Wireless LAN System using AP Authentication and Dynamic Key Exchange
    Jong Hu Lee , Myung Sun Lee , Jae Cheol Ryou The KIPS Transactions:PartC, Vol. 11, No. 4, pp. 497-508, Aug. 2004
    10.3745/KIPSTC.2004.11.4.497

    An Improved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack
    Jin Kwak , Soo Hyun Oh , Hyung Kyu Yang , Dong Ho Won The KIPS Transactions:PartC, Vol. 11, No. 4, pp. 439-446, Aug. 2004
    10.3745/KIPSTC.2004.11.4.439

    A Performance Evaluation of EAP-TLS Authentication Model in the AAAv6
    Yun Su Jeong , Hyung Do Kim , Hae Dong Lee , Hyun Gon Kim , Sang Ho Lee The KIPS Transactions:PartC, Vol. 11, No. 3, pp. 309-318, Jun. 2004
    10.3745/KIPSTC.2004.11.3.309

    A ZRP-based Reliable Route Discovery Scheme in Ad-Hoc Networks
    Kyoung Ja Kim , Tae Mu Chang The KIPS Transactions:PartC, Vol. 11, No. 3, pp. 293-300, Jun. 2004
    10.3745/KIPSTC.2004.11.3.293

    Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack
    Jin Kwak , Soo Hyun Oh , Hyung Kyu Yang , Dong Ho Won The KIPS Transactions:PartC, Vol. 11, No. 3, pp. 277-286, Jun. 2004
    10.3745/KIPSTC.2004.11.3.277

    Improvement of WEP Key transmission between APs during STA Movement in Wireless Environment
    Song Il Gyu , Hong Chung Seon , Lee Dae Yeong The KIPS Transactions:PartC, Vol. 11, No. 2, pp. 219-228, Apr. 2004
    10.3745/KIPSTC.2004.11.2.219

    A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography
    Yu Il Seon , Jo Gyeong San The KIPS Transactions:PartC, Vol. 10, No. 6, pp. 763-768, Oct. 2003
    10.3745/KIPSTC.2003.10.6.763

    Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card
    Lee Ju Hwa , Seol Gyeong Su , Jeong Min Su The KIPS Transactions:PartC, Vol. 10, No. 5, pp. 585-594, Oct. 2003
    10.3745/KIPSTC.2003.10.5.585

    Implementation of Security Enforcement Engine for Active Nodes in Active Networks
    Kim Og Gyeong , Im Ji Yeong , Na Hyeon Jeong , Na Ga Jin , Kim Yeo Jin , Chae Gi Jun , Kim Dong Yeong The KIPS Transactions:PartC, Vol. 10, No. 4, pp. 413-422, Aug. 2003
    10.3745/KIPSTC.2003.10.4.413

    Design of a effective Authorization Mechanism based on Kerberos
    Eun Hwan Kim , Moon Seog Jun The KIPS Transactions:PartC, Vol. 10, No. 3, pp. 287-294, Jun. 2003
    10.3745/KIPSTC.2003.10.3.287