Digital Library


Search: "[ keyword: information protection ]" (9)
    An Improved Identity Management Protocol for Internet Applications in Mobile Networks
    In Shin Park , Jong Pil Jeong The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 29-38, Feb. 2012
    10.3745/KIPSTC.2012.19.1.29

    The Attitude of the Internet Users to Real-Name System and Suggestions for Measures to Handle Adverse Effects of Anonymity -Focused on Comparison between a Group of Experts and a Group of Non-Experts-
    Shin Jung Baek The KIPS Transactions:PartC, Vol. 17, No. 4, pp. 315-332, Aug. 2010
    10.3745/KIPSTC.2010.17.4.315

    An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks
    Yang Jin Seo , Sang Yong Han The KIPS Transactions:PartC, Vol. 17, No. 1, pp. 15-26, Feb. 2010
    10.3745/KIPSTC.2010.17.1.15

    Efficient RFID Anti-collision Scheme Using Class Identification Algorithm
    Sung Jin Kim , Seok Cheon Park The KIPS Transactions:PartA, Vol. 15, No. 3, pp. 155-160, Jun. 2008
    10.3745/KIPSTA.2008.15.3.155

    A Study on Public Order Right Based on Analysis of the Administrative Disposition Results Against the Personal Information Protection Act Violation
    Jeon Ju Hyun, Rhee Kyung Hyune KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 11, pp. 395-402, Nov. 2022
    https://doi.org/10.3745/KTCCS.2022.11.11.395
    Keywords: Personal Information, Personal Information Protection Act, Administrative Dispositions, Public Order Right, Corrective Measures

    Efficient k-ATY Method to Protect the User’s Trajectory in Continuous Queries
    Song Doo Hee KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 8, pp. 231-234, Aug. 2021
    https://doi.org/10.3745/KTCCS.2021.10.8.231
    Keywords: Continuous Queries, information protection, trajectory, K-anonymity

    Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system
    Im Jae Deog , Yu Jun Seog , Kim Jeong Nyeo The KIPS Transactions:PartC, Vol. 10, No. 4, pp. 387-396, Aug. 2003
    10.3745/KIPSTC.2003.10.4.387

    Design of a Lightweight Security Protocol Using Post Quantum Cryptography
    Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 8, pp. 165-170, Aug. 2020
    https://doi.org/10.3745/KTCCS.2020.9.8.165  
    Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO

    Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services
    Ji-Hye Youn, Doo-Hee Song, Tian-Yuan Cai, Kwang-Jin Park KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 8, pp. 195-202, Aug. 2018
    10.3745/KTCCS.2018.7.8.195
    Keywords: Location-Bsed Services, information protection, Broadcast, Index