Mostrando 9 resultados de: 9
Filtros aplicados
Publisher
Information Technology Journal(1)
International Journal of Applied Engineering Research(1)
International Journal of Distributed Sensor Networks(1)
Journal of Electronic Testing: Theory and Applications (JETTA)(1)
Journal of Semiconductor Technology and Science(1)
Área temáticas
Física aplicada(4)
Derecho penal(1)
Fuerzas aéreas y otras fuerzas especializadas(1)
Funcionamiento de bibliotecas y archivos(1)
Programación informática, programas, datos, seguridad(1)
A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusDebug port protection mechanism for secure embedded devices
ArticleAbstract: In this paper we propose a protection mechanism for the debug port. While debug ports are useful tooPalabras claves:Authentication token, Debug port, Device hackingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusSERA: A secure energy reliability aware data gathering for sensor networks
ArticleAbstract: Wireless sensor networks are used in many applications in military, ecology, health, and other areasPalabras claves:Key generation, Network simulation, Secure protocol, Sensor networkAutores:Kang S.H., Kim J., Sang Guun YooFuentes:googlescopusPrivacy protection mechanism for indoor positioning systems
ArticleAbstract: Usageoflocation based services in indoor environments has grown as the popularity of smart devices hPalabras claves:indoor positioning system, Location based service, privacy, securityAutores:Kim J., Kim S., Sang Guun YooFuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopus