Digital Library


Search: "[ keyword: information protection ]" (6)
    An Improved Identity Management Protocol for Internet Applications in Mobile Networks
    In Shin Park , Jong Pil Jeong KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 1, pp. 29-38, Jan. 2012
    10.3745/KIPSTC.2012.19.1.29

    The Attitude of the Internet Users to Real-Name System and Suggestions for Measures to Handle Adverse Effects of Anonymity -Focused on Comparison between a Group of Experts and a Group of Non-Experts-
    Shin Jung Baek KIPS Transactions on Computer and Communication Systems, Vol. 17, No. 4, pp. 315-332, Apr. 2010
    10.3745/KIPSTC.2010.17.4.315

    An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks
    Yang Jin Seo , Sang Yong Han KIPS Transactions on Computer and Communication Systems, Vol. 17, No. 1, pp. 15-26, Jan. 2010
    10.3745/KIPSTC.2010.17.1.15

    Efficient RFID Anti-collision Scheme Using Class Identification Algorithm
    Sung Jin Kim , Seok Cheon Park KIPS Transactions on Computer and Communication Systems, Vol. 15, No. 3, pp. 155-160, Mar. 2008
    10.3745/KIPSTA.2008.15.3.155

    Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system
    Im Jae Deog , Yu Jun Seog , Kim Jeong Nyeo KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 4, pp. 387-396, Apr. 2003
    10.3745/KIPSTC.2003.10.4.387

    Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services
    Ji-Hye Youn, Doo-Hee Song, Tian-Yuan Cai, Kwang-Jin Park KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 8, pp. 195-202, Aug. 2018
    10.3745/KTCCS.2018.7.8.195
    Keywords: Location-Bsed Services, information protection, Broadcast, Index