Mostrando 10 resultados de: 14
Publisher
International Journal of Applied Engineering Research(2)
International Journal of Distributed Sensor Networks(2)
ACM International Conference Proceeding Series(1)
Cluster Computing(1)
Communications in Computer and Information Science(1)
Área temáticas
Ciencias de la computación(9)
Física aplicada(5)
Programación informática, programas, datos, seguridad(4)
Derecho penal(1)
Derecho privado(1)
A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusA security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusDDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusDebug port protection mechanism for secure embedded devices
ArticleAbstract: In this paper we propose a protection mechanism for the debug port. While debug ports are useful tooPalabras claves:Authentication token, Debug port, Device hackingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusIt-dependent strategic initiative to increase the marketing performance of mobile security solutions
ArticleAbstract: Purpose - Since mobile devices can hold vast amounts of confidential and sensitive information, theyPalabras claves:ATTACHMENT, Fear appeal, Interactivity, Mobile security, Protection motivation theoryAutores:Kim J., Sang Guun YooFuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusSecurity requirements prioritization based on threat modeling and valuation graph
Conference ObjectAbstract: Information systems manage assets that are critical for the business processes of organizations. ThePalabras claves:Security Requirement Prioritization, Threat modelingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus