Digital Library
Search: "[ keyword: Privacy ]" (36)
Design of Dynamic Location Privacy Protection Scheme Based on CS-RBAC
You Jin Song , Seoung Hyun Han , Dong Hyeok Lee The KIPS Transactions:PartC,
Vol. 13, No. 4, pp. 415-426,
Aug.
2006
10.3745/KIPSTC.2006.13.4.415

Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees
Yurim Bak, Yongtae Shin KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 11, pp. 329-336,
Nov.
2023
https://doi.org/10.3745/KTCCS.2023.12.11.329
Keywords: Privacy, Framework, Check List, Consinging, Re-Consigning

Keywords: Privacy, Framework, Check List, Consinging, Re-Consigning
Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN
Sung Ryoul Lee , Ji Myung Kang , Ho Gun Moon , Myung Soo Lee , Chong Kwon Kim The KIPS Transactions:PartC,
Vol. 12, No. 4, pp. 465-472,
Aug.
2005
10.3745/KIPSTC.2005.12.4.465

Reliability Analysis of Privacy Policies Using Android Static Analysis
Yoonkyo Jung KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 1, pp. 17-24,
Jan.
2023
https://doi.org/10.3745/KTCCS.2023.12.1.17
Keywords: Privacy Policy, Static Analysis, data privacy, Android Application

Keywords: Privacy Policy, Static Analysis, data privacy, Android Application
A Study on Non-Fungible Token Platform for Usability and Privacy Improvement
Kang Myung Joe, Kim Mi Hui KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 11, pp. 403-410,
Nov.
2022
https://doi.org/10.3745/KTCCS.2022.11.11.403
Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement

Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement
Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment
Dongyoung Koo KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 9, pp. 305-316,
Sep.
2022
https://doi.org/10.3745/KTCCS.2022.11.9.305
Keywords: Edge Computing, Privacy, Efficiency, Duplicate Elimination, Trusted Execution Environment

Keywords: Edge Computing, Privacy, Efficiency, Duplicate Elimination, Trusted Execution Environment
Improving Efficiency of Encrypted Data Deduplication with SGX
Dongyoung Koo KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 8, pp. 259-268,
Aug.
2022
https://doi.org/10.3745/KTCCS.2022.11.8.259
Keywords: Trusted Execution Environment, Privacy, Encryption, Deduplication, Efficiency

Keywords: Trusted Execution Environment, Privacy, Encryption, Deduplication, Efficiency
Unforgeable RFID Tag Variable ID Scheme with Efficient Identification
Jae Gwi Choi , Ji Hwan Park The KIPS Transactions:PartC,
Vol. 11, No. 4, pp. 447-454,
Aug.
2004
10.3745/KIPSTC.2004.11.4.447

Matrix Character Relocation Technique for Improving Data Privacyin Shard-Based Private Blockchain Environments
Yeol Kook Lee, Jung Won Seo, Soo Young Park KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 2, pp. 51-58,
Feb.
2022
https://doi.org/10.3745/KTCCS.2022.11.2.51
Keywords: Blockchain, data privacy, Hash Algorithm, Shard

Keywords: Blockchain, data privacy, Hash Algorithm, Shard
Privacy-Preserving Parallel Range Query Processing AlgorithmBased on Data Filtering in Cloud Computing
Hyeong Jin Kim, Jae-Woo Chang KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 9, pp. 243-250,
Sep.
2021
https://doi.org/10.3745/KTCCS.2021.10.9.243
Keywords: privacy-preserving, Cloud computing, Range Query Processing, Paillier Cryptosystem, Parallelism, Garbled Circuit

Keywords: privacy-preserving, Cloud computing, Range Query Processing, Paillier Cryptosystem, Parallelism, Garbled Circuit