Design of the intelligence user identification method for the improved password input method and the personality security
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, E.-S. | - |
dc.contributor.author | Kim, H.-K. | - |
dc.contributor.author | Lee, S.H. | - |
dc.date.available | 2019-04-10T11:22:52Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2007 | - |
dc.identifier.isbn | 9783540748267 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33735 | - |
dc.description.abstract | When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user's identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. This research relates to a user identification by an indirect password, which allows for a password control system to identify user by a received value, which is calculated with a predetermined function known to both user and password control system, and a value of a variable, which is provided form a password control system. According to the research, password cannot be embezzled in the input stage and hacking by intercept on the transmission line is to be in vain. © Springer-Verlag Berlin Heidelberg 2007. | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.title | Design of the intelligence user identification method for the improved password input method and the personality security | - |
dc.type | Conference | - |
dc.identifier.doi | 10.1007/978-3-540-74827-4_73 | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 11th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2007, and 17th Italian Workshop on Neural Networks, WIRN 2007, v.4693 LNAI, no.PART 2, pp.581 - 588 | - |
dc.description.journalClass | 2 | - |
dc.identifier.scopusid | 2-s2.0-38049005950 | - |
dc.citation.conferenceDate | 2007-09-12 | - |
dc.citation.conferencePlace | Vietri sul Mare | - |
dc.citation.endPage | 588 | - |
dc.citation.number | PART 2 | - |
dc.citation.startPage | 581 | - |
dc.citation.title | 11th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2007, and 17th Italian Workshop on Neural Networks, WIRN 2007 | - |
dc.citation.volume | 4693 LNAI | - |
dc.contributor.affiliatedAuthor | Lee, S.H. | - |
dc.type.docType | Conference Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.