SP Cheon, JM Kang, MW Park… - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
In this paper, we proposed 3-level authentication technique to prevent internal information
leakage in network system. When system authenticates users, it requires user's ID&P/W …