- 요약
- Abstract
- Ⅰ. 서론
- Ⅱ. 관련 연구
- Ⅲ. T-OTP 기반 LSH 해시체인 인증 아키텍처
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A107934977
2021
Korean
004
KCI등재
학술저널
13-28(16쪽)
0
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 Adrian Perrig, "The TESLA broadcast authentication protocol" 5 (5): 2-13, 2002
2 Haller, "The S/Key™ one-time password system" 151-157, 1994
3 Dmitry Kogan, "T/Key: Second-factor authentication from secure hash chains" 983-999, 2017
4 Dang, "Secure Hash Standard, Federal Inf. Process. Stds. (NIST FIPS)" National Institute of Standards and Technology (NIST)
5 "ROCA Vulnerability (CVE-2017-15361), National Vulnerability Database"
6 Lamport, "Password authentication with insecure communication" 24 (24): 770-772, 1981
7 "OpenSSL"
8 Eldefrawy, "OTP-based two-factor authentication using mobile phones" 327-331, 2011
9 "NS-3"
10 "MIL-STD-2045/47001D (CHANGE 1), Department of Defense Interface Standard: Connectionless Data Transfer Application Layer Standard"
1 Adrian Perrig, "The TESLA broadcast authentication protocol" 5 (5): 2-13, 2002
2 Haller, "The S/Key™ one-time password system" 151-157, 1994
3 Dmitry Kogan, "T/Key: Second-factor authentication from secure hash chains" 983-999, 2017
4 Dang, "Secure Hash Standard, Federal Inf. Process. Stds. (NIST FIPS)" National Institute of Standards and Technology (NIST)
5 "ROCA Vulnerability (CVE-2017-15361), National Vulnerability Database"
6 Lamport, "Password authentication with insecure communication" 24 (24): 770-772, 1981
7 "OpenSSL"
8 Eldefrawy, "OTP-based two-factor authentication using mobile phones" 327-331, 2011
9 "NS-3"
10 "MIL-STD-2045/47001D (CHANGE 1), Department of Defense Interface Standard: Connectionless Data Transfer Application Layer Standard"
11 K. Dong-Chan, "LSH: A new fast secure hash function family" 286-313, 2014
12 Sencun Zhu, "LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks" 749-755, 2003
13 "Korea Internet & Security Agency (KISA)"
14 Rehan Akbani, "HEAP: Hop-by-hop efficient authentication protocol for mobile ad-hoc networks" 157-165, 2007
15 Wang, Xiaoyun, "Finding collisions in the full SHA-1"" 17-36, 2005
16 Bittl, "Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions" 213-220, 2014
17 National Institute of Standards and Technology (NIST), "Digital Signature Standard (DSS) - FIPS 186-5 (Draft)"
18 Xinming Yin, "An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree" MDPI AG 20 (20): 5735-, 2020
19 Haojun Zhang, "A novel self-renewal hash chain and its implementation" 144-149, 2008
20 Kashif Shahzad, "A novel hybrid narrowband/wideband networking waveform physical layer for multiuser multiband transmission and reception in software defined radio" Elsevier BV 36 : 2019
21 Dohoon Kim, "A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard" MDPI AG 10 (10): 8999-, 2020
체류 지점 식별을 통한 POI 기반 사용자 이동 경로 분석 기법
Line Drawing Mobile App using Hybrid Approach
Efficient Visual Sentiment Detector using Knowledge Distillation
학술지 이력
연월일 | 이력구분 | 이력상세 | 등재구분 |
---|---|---|---|
2022 | 평가예정 | 재인증평가 신청대상 (재인증) | |
2019-01-01 | 평가 | 등재학술지 유지 (계속평가) | ![]() |
2016-01-01 | 평가 | 등재학술지 유지 (계속평가) | ![]() |
2012-01-01 | 평가 | 등재학술지 유지 (등재유지) | ![]() |
2009-01-01 | 평가 | 등재학술지 선정 (등재후보2차) | ![]() |
2008-01-01 | 평가 | 등재후보 1차 PASS (등재후보1차) | ![]() |
2006-01-01 | 평가 | 등재후보학술지 선정 (신규평가) | ![]() |
학술지 인용정보
기준연도 | WOS-KCI 통합IF(2년) | KCIF(2년) | KCIF(3년) |
---|---|---|---|
2016 | 0.45 | 0.45 | 0.39 |
KCIF(4년) | KCIF(5년) | 중심성지수(3년) | 즉시성지수 |
0.38 | 0.35 | 0.566 | 0.16 |