• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: RMI ]" (17)
  1. 1. A Study on the Improving Information Investigation Techniques to guarantee Internet Safety and Personal Privacy
  2. 2. Deep Learning-Based Prediction of the Quality of Multiple Concurrent Beams in mmWave Band
    Jun-Hyeok Choi, Mun-Suk Kim, Vol. 23, No. 3, pp. 13-20, Jun. 2022
    10.7472/jksii.2022.23.3.13
    Keywords: mmWave, 802.11ay, beamforming, MU-MIMO, Deep Learning
  3. 3. Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric
    Ye-Jin Choi, Kyoung-jin Kim, Vol. 21, No. 1, pp. 95-102, Feb. 2020
    10.7472/jksii.2020.21.1.95
    Keywords: Blockchain, Hyperledger Fabric, Healthcare, Permissioned blockchain
  4. 4. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations
  5. 5. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    10.7472/jksii.2017.18.6.75
    Keywords: Permissioned blockchain, role-based access control, Medical data
  6. 6. A Study on the Determinant Factors of the Social Capital Construction through Social Media: Focused on college students
    Byung-Hye Lee, Vol. 17, No. 2, pp. 97-108, Apr. 2016
    10.7472/jksii.2016.17.2.97
    Keywords: Social Media, Social Capital, Determinant Factors, trust
  7. 7. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -
    Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
    10.7472/jksii.2016.17.1.91
    Keywords: Mobile Security, android security, permissions, least privilege
  8. 8. On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
  9. 9. Overview of Personal Information Protection Act in Korea
    Ilhwan Kim, Jaeho Sung, Vol. 16, No. 4, pp. 141-148, Aug. 2015
    10.7472/jksii.2015.16.4.141
    Keywords: IT, Personal Information, Personal Information Protection Act, Right to Informational Self Determination, E Government
  10. 10. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI