• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: Privacy" (14)
  1. 1. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  2. 2. Privacy-Preserving DNA Matching Protocol
    Geontae Noh, Vol. 19, No. 2, pp. 1-7, Apr. 2018
    10.7472/jksii.2018.19.2.1
    Keywords: Privacy-Preserving Inner Product, DNA Matching Protocol
  3. 3. Efficient dummy generation for protecting location privacy in location based services
    Tian-yuan Cai, Ji-hye Youn, Doo-hee Song, Kwang-jin Park, Vol. 18, No. 5, pp. 23-30, Oct. 2017
    10.7472/jksii.2017.18.5.23
    Keywords: cloaked region, dummy, K-anonymity, location protection, Privacy
  4. 4. VANET Privacy Assurance Architecture Design
    Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
    10.7472/jksii.2016.17.6.81
    Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security
  5. 5. A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
    Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
    10.7472/jksii.2016.17.2.77
    Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten
  6. 6. A Study on the Organization and Authority of the Personal Information Protection Commission
  7. 7. AMV: A k-anonymization technique minimizing the cloaking region
    Doohee Song, Minjae Heo, Jongwon Sim, Sori Hwang, Moonbae Song, Kwangjin Park, Vol. 15, No. 6, pp. 9-14, Dec. 2014
    10.7472/jksii.2014.15.6.09
    Keywords: cloaking, k-anonymization, location based service, spatial data, Privacy
  8. 8. Analysis of the Facebook Profiles for Korean Users: Description and Determinants
    Mina Lee, Seungah Lee, Inhye Choi, Vol. 15, No. 2, pp. 73-86, Apr. 2014
    10.7472/jksii.2014.15.2.73
    Keywords: Facebook, Facebook profiles, Personal Information, privacy concern
  9. 9. A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory
    Chanouk Park, Sang-Woo Lee, Vol. 15, No. 2, pp. 59-72, Apr. 2014
    10.7472/jksii.2014.15.2.59
    Keywords: Privacy, Privacy protection behavior, protection motivation theory, Privacy Act
  10. 10. A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation
    Sechung Pang, Ilkyeun Ra, Yangwoo Kim, Vol. 13, No. 5, pp. 55-64, Oct. 2012
    10.7472/jksii.2012.13.5.55
    Keywords: Secret Sharing, Privacy Information, Cloud computing, Hadoop