Digital Library
Search: "[ keyword: Security ]" (82)
-
Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin, Vol. 21, No. 1, pp. 179-190, Feb. 2020
10.7472/jksii.2020.21.1.179
Keywords: Control Flow Integrity, GOT/PLT, linking and loading, Security -
Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
10.7472/jksii.2019.20.4.01
Keywords: Blockchain, access control, Security, Privacy -
Shakhriddin Rustamov, Younho Lee, Vol. 20, No. 3, pp. 25-31, Jun. 2019
10.7472/jksii.2019.20.3.25
Keywords: Efficient Implementation, Lizard, Post-Quantum Cryptography, cryptography, Security -
Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
10.7472/jksii.2019.20.1.01
Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail -
Youn-chul Kang, Jong-chang Ahn, Vol. 19, No. 6, pp. 9-20, Dec. 2018
10.7472/jksii.2018.19.6.9
Keywords: Personal information security management system; Non-conformity trends; Business continuity management system; Certification audit; Information security management system; Control area -
56. A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money launderingHeejung Kang, Hye Ri Kim, Seng-phil Hong, Vol. 19, No. 5, pp. 1-11, Oct. 2018
10.7472/jksii.2018.19.5.1
Keywords: Blockchain, Smart Contract, AML, Security -
Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
10.7472/jksii.2016.17.6.81
Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security -
Dongsu Seo, Vol. 17, No. 4, pp. 79-86, Aug. 2016
10.7472/jksii.2016.17.4.79
Keywords: Security Metric, Secure Coding, Code Quality, Security-enhanced development -
Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
10.7472/jksii.2016.17.3.11
Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping -
Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
10.7472/jksii.2016.17.2.77
Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten




