Digital Library
Search: "[ keyword: information protection ]" (9)
An Improved Identity Management Protocol for Internet Applications in Mobile Networks
In Shin Park , Jong Pil Jeong The KIPS Transactions:PartC,
Vol. 19, No. 1, pp. 29-38,
Feb.
2012
10.3745/KIPSTC.2012.19.1.29
10.3745/KIPSTC.2012.19.1.29
The Attitude of the Internet Users to Real-Name System and Suggestions for Measures to Handle Adverse Effects of Anonymity -Focused on Comparison between a Group of Experts and a Group of Non-Experts-
Shin Jung Baek The KIPS Transactions:PartC,
Vol. 17, No. 4, pp. 315-332,
Aug.
2010
10.3745/KIPSTC.2010.17.4.315
10.3745/KIPSTC.2010.17.4.315
An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks
Yang Jin Seo , Sang Yong Han The KIPS Transactions:PartC,
Vol. 17, No. 1, pp. 15-26,
Feb.
2010
10.3745/KIPSTC.2010.17.1.15
10.3745/KIPSTC.2010.17.1.15
Efficient RFID Anti-collision Scheme Using Class Identification Algorithm
Sung Jin Kim , Seok Cheon Park The KIPS Transactions:PartA,
Vol. 15, No. 3, pp. 155-160,
Jun.
2008
10.3745/KIPSTA.2008.15.3.155
10.3745/KIPSTA.2008.15.3.155
A Study on Public Order Right Based on Analysis of the Administrative Disposition Results Against the Personal Information Protection Act Violation
Jeon Ju Hyun, Rhee Kyung Hyune KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 11, pp. 395-402,
Nov.
2022
https://doi.org/10.3745/KTCCS.2022.11.11.395
Keywords: Personal Information, Personal Information Protection Act, Administrative Dispositions, Public Order Right, Corrective Measures
https://doi.org/10.3745/KTCCS.2022.11.11.395
Keywords: Personal Information, Personal Information Protection Act, Administrative Dispositions, Public Order Right, Corrective Measures
Efficient k-ATY Method to Protect the User’s Trajectory in Continuous Queries
Song Doo Hee KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 8, pp. 231-234,
Aug.
2021
https://doi.org/10.3745/KTCCS.2021.10.8.231
Keywords: Continuous Queries, information protection, trajectory, K-anonymity
https://doi.org/10.3745/KTCCS.2021.10.8.231
Keywords: Continuous Queries, information protection, trajectory, K-anonymity
Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system
Im Jae Deog , Yu Jun Seog , Kim Jeong Nyeo The KIPS Transactions:PartC,
Vol. 10, No. 4, pp. 387-396,
Aug.
2003
10.3745/KIPSTC.2003.10.4.387
10.3745/KIPSTC.2003.10.4.387
Design of a Lightweight Security Protocol Using Post Quantum Cryptography
Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 8, pp. 165-170,
Aug.
2020
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO
Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services
Ji-Hye Youn, Doo-Hee Song, Tian-Yuan Cai, Kwang-Jin Park KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 8, pp. 195-202,
Aug.
2018
10.3745/KTCCS.2018.7.8.195
Keywords: Location-Bsed Services, information protection, Broadcast, Index
10.3745/KTCCS.2018.7.8.195
Keywords: Location-Bsed Services, information protection, Broadcast, Index