Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Design of the intelligence user identification method for the improved password input method and the personality security

Full metadata record
DC Field Value Language
dc.contributor.authorLee, E.-S.-
dc.contributor.authorKim, H.-K.-
dc.contributor.authorLee, S.H.-
dc.date.available2019-04-10T11:22:52Z-
dc.date.created2018-04-17-
dc.date.issued2007-
dc.identifier.isbn9783540748267-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33735-
dc.description.abstractWhen executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user's identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. This research relates to a user identification by an indirect password, which allows for a password control system to identify user by a received value, which is calculated with a predetermined function known to both user and password control system, and a value of a variable, which is provided form a password control system. According to the research, password cannot be embezzled in the input stage and hacking by intercept on the transmission line is to be in vain. © Springer-Verlag Berlin Heidelberg 2007.-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.titleDesign of the intelligence user identification method for the improved password input method and the personality security-
dc.typeConference-
dc.identifier.doi10.1007/978-3-540-74827-4_73-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation11th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2007, and 17th Italian Workshop on Neural Networks, WIRN 2007, v.4693 LNAI, no.PART 2, pp.581 - 588-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-38049005950-
dc.citation.conferenceDate2007-09-12-
dc.citation.conferencePlaceVietri sul Mare-
dc.citation.endPage588-
dc.citation.numberPART 2-
dc.citation.startPage581-
dc.citation.title11th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2007, and 17th Italian Workshop on Neural Networks, WIRN 2007-
dc.citation.volume4693 LNAI-
dc.contributor.affiliatedAuthorLee, S.H.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Sang Ho photo

Lee, Sang Ho
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE