Mostrando 10 resultados de: 12
Filtros aplicados
Publisher
International Journal of Applied Engineering Research(2)
International Journal of Distributed Sensor Networks(2)
ACM International Conference Proceeding Series(1)
Communications in Computer and Information Science(1)
Information Technology Journal(1)
Área temáticas
Ciencias de la computación(8)
Física aplicada(5)
Programación informática, programas, datos, seguridad(3)
Derecho penal(1)
Derecho privado(1)
Área de conocimiento
Ciencias de la computación(7)
Software(3)
Ingeniería de software(2)
Red de sensores inalámbricos(2)
Red informática(2)
A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusA security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusIt-dependent strategic initiative to increase the marketing performance of mobile security solutions
ArticleAbstract: Purpose - Since mobile devices can hold vast amounts of confidential and sensitive information, theyPalabras claves:ATTACHMENT, Fear appeal, Interactivity, Mobile security, Protection motivation theoryAutores:Kim J., Sang Guun YooFuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusSERA: A secure energy reliability aware data gathering for sensor networks
ArticleAbstract: Wireless sensor networks are used in many applications in military, ecology, health, and other areasPalabras claves:Key generation, Network simulation, Secure protocol, Sensor networkAutores:Kang S.H., Kim J., Sang Guun YooFuentes:googlescopusPrivacy protection mechanism for indoor positioning systems
ArticleAbstract: Usageoflocation based services in indoor environments has grown as the popularity of smart devices hPalabras claves:indoor positioning system, Location based service, privacy, securityAutores:Kim J., Kim S., Sang Guun YooFuentes:googlescopusSecurity requirements prioritization based on threat modeling and valuation graph
Conference ObjectAbstract: Information systems manage assets that are critical for the business processes of organizations. ThePalabras claves:Security Requirement Prioritization, Threat modelingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus