Digital Library


Search: "[ keyword: information protection ]" (6)
    An Improved Identity Management Protocol for Internet Applications in Mobile Networks
    In Shin Park , Jong Pil Jeong The KIPS Transactions:PartC, Vol. 19, No. 1, pp. 29-38, Feb. 2012
    10.3745/KIPSTC.2012.19.1.29


    The Attitude of the Internet Users to Real-Name System and Suggestions for Measures to Handle Adverse Effects of Anonymity -Focused on Comparison between a Group of Experts and a Group of Non-Experts-
    Shin Jung Baek The KIPS Transactions:PartC, Vol. 17, No. 4, pp. 315-332, Aug. 2010
    10.3745/KIPSTC.2010.17.4.315


    An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks
    Yang Jin Seo , Sang Yong Han The KIPS Transactions:PartC, Vol. 17, No. 1, pp. 15-26, Feb. 2010
    10.3745/KIPSTC.2010.17.1.15


    Efficient RFID Anti-collision Scheme Using Class Identification Algorithm
    Sung Jin Kim , Seok Cheon Park The KIPS Transactions:PartA, Vol. 15, No. 3, pp. 155-160, Jun. 2008
    10.3745/KIPSTA.2008.15.3.155


    k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous Query Processing
    Song Doo Hee The Transactions of the Korea Information Processing Society, Vol. 14, No. 6, pp. 379-385, Jun. 2025
    https://doi.org/10.3745/TKIPS.2025.14.6.379
    Keywords: Location-based service, information protection, continuous query processing, k-trajectories(k-T), Guaranteed k-trajectories(k-TG)


    Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system
    Im Jae Deog , Yu Jun Seog , Kim Jeong Nyeo The KIPS Transactions:PartC, Vol. 10, No. 4, pp. 387-396, Aug. 2003
    10.3745/KIPSTC.2003.10.4.387