Digital Library


Search: "[ keyword: Privacy ]" (26)
    An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency
    Hae Soon Ahn , Eun Jun Yoon , In Gil Nam The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 9-18, Feb. 2012
    10.3745/KIPSTC.2012.19.1.9


    A Framework for Trustworthy Open Shared Authentication Protocol
    Seung Chul Park The KIPS Transactions:PartC, Vol. 18, No. 6, pp. 389-396, Dec. 2011
    10.3745/KIPSTC.2011.18.6.389


    Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers
    Woo Sik Bae , Jong Yun Lee The KIPS Transactions:PartC, Vol. 18, No. 5, pp. 331-338, Oct. 2011
    10.3745/KIPSTC.2011.18.5.331


    Privacy Management Based on Profile for Personalized Services in u-City
    Jun Gyu Lee , Ji Ho Kim , Oh Young Song The KIPS Transactions:PartC, Vol. 17, No. 2, pp. 135-144, Apr. 2010
    10.3745/KIPSTC.2010.17.2.135


    An Efficient Anonymous Authentication Protocol Based on Multiple Anonymous Certificates in VANET
    Chae Duk Jung , Chul Sur , Young Ho Park , Kyung Hyune Rhee The KIPS Transactions:PartC, Vol. 16, No. 5, pp. 589-596, Oct. 2009
    10.3745/KIPSTC.2009.16.5.589


    An Algorithm for Improving the Accuracy of Privacy-Preserving Technique Based on Random Substitutions
    Ju Sung Kang , Chang Woo Lee , Do Won Hong The KIPS Transactions:PartC, Vol. 16, No. 5, pp. 563-574, Oct. 2009
    10.3745/KIPSTC.2009.16.5.563


    Efficient RFID Search Protocols Providing Enhanced User Privacy
    Ji Hwan Lim , Hee Kuck Oh , Dae Hun Nyang , Mun Kyu Lee , Sang Jin Kim The KIPS Transactions:PartC, Vol. 16, No. 3, pp. 347-356, Jun. 2009
    10.3745/KIPSTC.2009.16.3.347


    The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems
    Dong Chul Kim , Ji Young Chun , Eun Young Choi , Dong Hoon Lee The KIPS Transactions:PartC, Vol. 16, No. 2, pp. 189-198, Apr. 2009
    10.3745/KIPSTC.2009.16.2.189


    A New Dynamic-ID based REIF Mutual Authentication Protocol Eliminated Synchronization Problem
    Ji Hwan Lim , Hee Kuck Oh , Sang Jin Kim The KIPS Transactions:PartC, Vol. 15, No. 6, pp. 469-480, Dec. 2008
    10.3745/KIPSTC.2008.15.6.469


    Integrated Evaluation of Security, Usability, and Privacy in Secure Messengers: A Selection Guide by Organizational Type
    Hyeon Gyeong Kim, Ch ae Won An, Kwang Soo Cho, Seung Joo Kim The Transactions of the Korea Information Processing Society, Vol. 14, No. 10, pp. 825-837, Oct. 2025
    https://doi.org/10.3745/TKIPS.2025.14.10.825
    Keywords: Secure Messengers, Security, Usability, Privacy