A Security Model Analysis Adopt to Authentication State Information in IPTV Environment
Vol. 35, No. 3, pp. 421-430, Mar. 2010
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
Y. Jeong, Y. Jung, Y. Kim, G. Park, S. Lee, "A Security Model Analysis Adopt to Authentication State Information in IPTV Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 3, pp. 421-430, 2010. DOI: .
[ACM Style]
Yoon-Su Jeong, Yoon-Sung Jung, Yong-Tae Kim, Gil-Cheol Park, and Sang-Ho Lee. 2010. A Security Model Analysis Adopt to Authentication State Information in IPTV Environment. The Journal of Korean Institute of Communications and Information Sciences, 35, 3, (2010), 421-430. DOI: .
[KICS Style]
Yoon-Su Jeong, Yoon-Sung Jung, Yong-Tae Kim, Gil-Cheol Park, Sang-Ho Lee, "A Security Model Analysis Adopt to Authentication State Information in IPTV Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 3, pp. 421-430, 3. 2010.