Detailed Information

Cited 0 time in webofscience Cited 3 time in scopus
Metadata Downloads

A design of home network security protocol using user authentication and access control technology

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Y.G.-
dc.contributor.authorKim, H.C.-
dc.contributor.authorKim, J.J.-
dc.contributor.authorJun, M.S.-
dc.date.available2019-04-10T11:17:18Z-
dc.date.created2018-04-17-
dc.date.issued2008-
dc.identifier.isbn9780769533285-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33574-
dc.description.abstractThis paper designs and suggests a home network security protocol using user authentication and access control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate. Also, the excellence of the protocol suggested in this paper can be confirmed by experimenting, comparing, and analyzing many categories such as number of computations and hash computation, quantity of sending out or receiving data, number of encryption, and the size of used keys while authenticating users in existing commercial products. © 2008 IEEE.-
dc.relation.isPartOfProceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008-
dc.titleA design of home network security protocol using user authentication and access control technology-
dc.typeConference-
dc.identifier.doi10.1109/ICHIT.2008.200-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008, pp.30 - 34-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-55849145871-
dc.citation.conferenceDate2008-08-28-
dc.citation.conferencePlaceDaejeon-
dc.citation.endPage34-
dc.citation.startPage30-
dc.citation.title2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008-
dc.contributor.affiliatedAuthorJun, M.S.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE