Digital Library
Search: "[ keyword: Privacy ]" (39)
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Global Roaming Environment
Jong Sik Moon , Im Yeong Lee The KIPS Transactions:PartC,
Vol. 14, No. 2, pp. 129-138,
Apr.
2007
10.3745/KIPSTC.2007.14.2.129
Authentication Protocol Of The Read Only RFID Tag Using Partial ID
Yong Zhen Li , Yonn Su Jeong , Dong Il Seo , Sang Ho Lee The KIPS Transactions:PartC,
Vol. 13, No. 5, pp. 595-600,
Oct.
2006
10.3745/KIPSTC.2006.13.5.595
Design of Dynamic Location Privacy Protection Scheme Based on CS-RBAC
You Jin Song , Seoung Hyun Han , Dong Hyeok Lee The KIPS Transactions:PartC,
Vol. 13, No. 4, pp. 415-426,
Aug.
2006
10.3745/KIPSTC.2006.13.4.415
Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees
Yurim Bak, Yongtae Shin KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 11, pp. 329-336,
Nov.
2023
https://doi.org/10.3745/KTCCS.2023.12.11.329
Keywords: Privacy, Framework, Check List, Consinging, Re-Consigning
Keywords: Privacy, Framework, Check List, Consinging, Re-Consigning
Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN
Sung Ryoul Lee , Ji Myung Kang , Ho Gun Moon , Myung Soo Lee , Chong Kwon Kim The KIPS Transactions:PartC,
Vol. 12, No. 4, pp. 465-472,
Aug.
2005
10.3745/KIPSTC.2005.12.4.465
Reliability Analysis of Privacy Policies Using Android Static Analysis
Yoonkyo Jung KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 1, pp. 17-24,
Jan.
2023
https://doi.org/10.3745/KTCCS.2023.12.1.17
Keywords: Privacy Policy, Static Analysis, data privacy, Android Application
Keywords: Privacy Policy, Static Analysis, data privacy, Android Application
A Study on Non-Fungible Token Platform for Usability and Privacy Improvement
Kang Myung Joe, Kim Mi Hui KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 11, pp. 403-410,
Nov.
2022
https://doi.org/10.3745/KTCCS.2022.11.11.403
Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement
Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement
Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment
Dongyoung Koo KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 9, pp. 305-316,
Sep.
2022
https://doi.org/10.3745/KTCCS.2022.11.9.305
Keywords: Edge Computing, Privacy, Efficiency, Duplicate Elimination, Trusted Execution Environment
Keywords: Edge Computing, Privacy, Efficiency, Duplicate Elimination, Trusted Execution Environment
Improving Efficiency of Encrypted Data Deduplication with SGX
Dongyoung Koo KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 8, pp. 259-268,
Aug.
2022
https://doi.org/10.3745/KTCCS.2022.11.8.259
Keywords: Trusted Execution Environment, Privacy, Encryption, Deduplication, Efficiency
Keywords: Trusted Execution Environment, Privacy, Encryption, Deduplication, Efficiency
Unforgeable RFID Tag Variable ID Scheme with Efficient Identification
Jae Gwi Choi , Ji Hwan Park The KIPS Transactions:PartC,
Vol. 11, No. 4, pp. 447-454,
Aug.
2004
10.3745/KIPSTC.2004.11.4.447