• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (55)
  1. 1. CFI Approach to Defend against GOT Overwrite Attacks
    Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin, Vol. 21, No. 1, pp. 179-190, Feb. 2020
    10.7472/jksii.2020.21.1.179
    Keywords: Control Flow Integrity, GOT/PLT, linking and loading, Security
  2. 2. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  3. 3. Improving the speed of the Lizard implementation
    Shakhriddin Rustamov, Younho Lee, Vol. 20, No. 3, pp. 25-31, Jun. 2019
    10.7472/jksii.2019.20.3.25
    Keywords: Efficient Implementation, Lizard, Post-Quantum Cryptography, cryptography, Security
  4. 4. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail
  5. 5. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations
  6. 6. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering
    Heejung Kang, Hye Ri Kim, Seng-phil Hong, Vol. 19, No. 5, pp. 1-11, Oct. 2018
    10.7472/jksii.2018.19.5.1
    Keywords: Blockchain, Smart Contract, AML, Security
  7. 7. Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider
    Jung-Gyu Lee, Seung-Ryul Jeong, Vol. 18, No. 5, pp. 113-121, Oct. 2017
    10.7472/jksii.2017.18.5.113
    Keywords: Dashboard, Key Performance Indicator, Vulnerability, Service Performance, internet security
  8. 8. Design and Implementation of Digital Jikin using Smartphone Application
    Daewon Hong, Miju Kang, Junchul Chun, Vol. 18, No. 5, pp. 87-94, Oct. 2017
    10.7472/jksii.2017.18.5.87
    Keywords: digital certification, Digital Jikin, image processing, Data security, Android Application, Smartphone
  9. 9. Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet Banking
    Hye-Seung Park, Jae-Hyup Lee, Seung-Chul Park, Vol. 18, No. 4, pp. 69-78, Aug. 2017
    10.7472/jksii.2017.18.4.69
    Keywords: Internet banking, banking security, NPKI banking, open banking
  10. 10. Status and Future of Security Techniques in the Internet Banking Service