Digital Library


Search: "[ keyword: Privacy ]" (33)
    Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees
    Yurim Bak, Yongtae Shin KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 11, pp. 329-336, Nov. 2023
    https://doi.org/10.3745/KTCCS.2023.12.11.329
    Keywords: Privacy, Framework, Check List, Consinging, Re-Consigning

    Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN
    Sung Ryoul Lee , Ji Myung Kang , Ho Gun Moon , Myung Soo Lee , Chong Kwon Kim The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 465-472, Aug. 2005
    10.3745/KIPSTC.2005.12.4.465

    Reliability Analysis of Privacy Policies Using Android Static Analysis
    Yoonkyo Jung KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 1, pp. 17-24, Jan. 2023
    https://doi.org/10.3745/KTCCS.2023.12.1.17
    Keywords: Privacy Policy, Static Analysis, data privacy, Android Application

    A Study on Non-Fungible Token Platform for Usability and Privacy Improvement
    Kang Myung Joe, Kim Mi Hui KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 11, pp. 403-410, Nov. 2022
    https://doi.org/10.3745/KTCCS.2022.11.11.403
    Keywords: Non-Fungible Token, Blockchain, Cloud computing, Usability and Privacy Improvement

    Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment
    Dongyoung Koo KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 9, pp. 305-316, Sep. 2022
    https://doi.org/10.3745/KTCCS.2022.11.9.305
    Keywords: Edge Computing, Privacy, Efficiency, Duplicate Elimination, Trusted Execution Environment

    Improving Efficiency of Encrypted Data Deduplication with SGX
    Dongyoung Koo KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 8, pp. 259-268, Aug. 2022
    https://doi.org/10.3745/KTCCS.2022.11.8.259
    Keywords: Trusted Execution Environment, Privacy, Encryption, Deduplication, Efficiency

    Unforgeable RFID Tag Variable ID Scheme with Efficient Identification
    Jae Gwi Choi , Ji Hwan Park The KIPS Transactions:PartC, Vol. 11, No. 4, pp. 447-454, Aug. 2004
    10.3745/KIPSTC.2004.11.4.447

    Matrix Character Relocation Technique for Improving Data Privacyin Shard-Based Private Blockchain Environments
    Yeol Kook Lee, Jung Won Seo, Soo Young Park KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 2, pp. 51-58, Feb. 2022
    https://doi.org/10.3745/KTCCS.2022.11.2.51
    Keywords: Blockchain, data privacy, Hash Algorithm, Shard

    Privacy-Preserving Parallel Range Query Processing AlgorithmBased on Data Filtering in Cloud Computing
    Hyeong Jin Kim, Jae-Woo Chang KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 9, pp. 243-250, Sep. 2021
    https://doi.org/10.3745/KTCCS.2021.10.9.243
    Keywords: privacy-preserving, Cloud computing, Range Query Processing, Paillier Cryptosystem, Parallelism, Garbled Circuit

    Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments
    Kim Sun Seog , Lee Chang Hun The KIPS Transactions:PartC, Vol. 10, No. 7, pp. 867-878, Dec. 2003
    10.3745/KIPSTC.2003.10.7.867