Mostrando 6 resultados de: 6
Publisher
ACM International Conference Proceeding Series(1)
Communications in Computer and Information Science(1)
Information Technology Journal(1)
International Journal of Distributed Sensor Networks(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Área temáticas
Ciencias de la computación(4)
Física aplicada(2)
Derecho privado(1)
Fuerzas aéreas y otras fuerzas especializadas(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Ciencias de la computación(3)
Software(3)
Ingeniería de software(2)
Red informática(2)
Red de sensores inalámbricos(1)
A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopusSecurity requirements prioritization based on threat modeling and valuation graph
Conference ObjectAbstract: Information systems manage assets that are critical for the business processes of organizations. ThePalabras claves:Security Requirement Prioritization, Threat modelingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus