• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (82)
  1. 51. CFI Approach to Defend against GOT Overwrite Attacks
    Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin, Vol. 21, No. 1, pp. 179-190, Feb. 2020
    10.7472/jksii.2020.21.1.179
    Keywords: Control Flow Integrity, GOT/PLT, linking and loading, Security
  2. 52. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  3. 53. Improving the speed of the Lizard implementation
    Shakhriddin Rustamov, Younho Lee, Vol. 20, No. 3, pp. 25-31, Jun. 2019
    10.7472/jksii.2019.20.3.25
    Keywords: Efficient Implementation, Lizard, Post-Quantum Cryptography, cryptography, Security
  4. 54. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail
  5. 55. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations
  6. 56. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering
    Heejung Kang, Hye Ri Kim, Seng-phil Hong, Vol. 19, No. 5, pp. 1-11, Oct. 2018
    10.7472/jksii.2018.19.5.1
    Keywords: Blockchain, Smart Contract, AML, Security
  7. 57. VANET Privacy Assurance Architecture Design
    Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
    10.7472/jksii.2016.17.6.81
    Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security
  8. 58. Definition of Security Metrics for Software Security-enhanced Development
    Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
    10.7472/jksii.2016.17.4.79
    Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development
  9. 59. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  10. 60. A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
    Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
    10.7472/jksii.2016.17.2.77
    Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten