Digital Library
Search: "[ keyword: Encryption ]" (85)
A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest
Dongyeol Son,
Jimin Kim,
Cheongmin Ji,
Kangseok Kim,
Kihyung Kim,
Manpyo Hong,
Vol. 28, No. 2, pp. 311-325,
Apr.
2018
10.13089/JKIISC.2018.28.2.311
Keywords: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead
10.13089/JKIISC.2018.28.2.311
Keywords: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead
An Application Obfuscation Method Using Security Token for Encryption in Android
JinSeop Shin,
Jaehwan Ahn,
Vol. 27, No. 6, pp. 1457-1465,
Dec.
2017
10.13089/JKIISC.2017.27.6.1457
Keywords: Android, Encryption, security token
10.13089/JKIISC.2017.27.6.1457
Keywords: Android, Encryption, security token
Accountable Authority Revocable Identity-Based Encryption
Suri Choi,
Dong Hoon Lee,
Vol. 27, No. 6, pp. 1281-1293,
Dec.
2017
10.13089/JKIISC.2017.27.6.1281
Keywords: Identity-Based Encryption, Revocable IBE, Accountable Authority IBE, PKI
10.13089/JKIISC.2017.27.6.1281
Keywords: Identity-Based Encryption, Revocable IBE, Accountable Authority IBE, PKI
Masking-Based Block Cipher LEA Resistant to Side Channel Attacks
Eunsoo Park,
Soohyun Oh,
Jaecheol Ha,
Vol. 27, No. 5, pp. 1023-1032,
Oct.
2017
10.13089/JKIISC.2017.27.5.1023
Keywords: Cyber-Physical System, IoT, Lightweight Encryption, Block Cipher LEA, AtoB Masking
10.13089/JKIISC.2017.27.5.1023
Keywords: Cyber-Physical System, IoT, Lightweight Encryption, Block Cipher LEA, AtoB Masking
Study on Memory Data Encryption of Windows Hibernation File
Kyoungho Lee,
Wooho Lee,
Bongnam Noh,
Vol. 27, No. 5, pp. 1013-1022,
Oct.
2017
10.13089/JKIISC.2017.27.5.1013
Keywords: physical memory, Memory Encryption, Hibernation File
10.13089/JKIISC.2017.27.5.1013
Keywords: physical memory, Memory Encryption, Hibernation File
Efficient Outsourced Multiparty Computations Based on Partially Homomorphic Encryption
Hasoo Eun,
Ubaidullah Ubaidullah,
Heekuck Oh,
Vol. 27, No. 3, pp. 477-488,
Jun.
2017
10.13089/JKIISC.2017.27.3.477
Keywords: Multiparty Computations, Outsourced MPCs, Proxy Re-Encryptions, Delegating Computations
10.13089/JKIISC.2017.27.3.477
Keywords: Multiparty Computations, Outsourced MPCs, Proxy Re-Encryptions, Delegating Computations
Implementation and Performance Enhancement of Arithmetic Adder for Fully Homomorphic Encrypted Data
Kyongjin Seo,
Pyong Kim,
Younho Lee,
Vol. 27, No. 3, pp. 413-426,
Jun.
2017
10.13089/JKIISC.2017.27.3.413
Keywords: Fully homomorphic encryption, Adder, Operations Over Encrypted Data, Applied Cryptography, Security
10.13089/JKIISC.2017.27.3.413
Keywords: Fully homomorphic encryption, Adder, Operations Over Encrypted Data, Applied Cryptography, Security
Error Control Protocol and Data Encryption Mechanism in the One-Way Network
Jaecheol Ha,
Kihyun Kim,
Vol. 26, No. 3, pp. 613-622,
Jun.
2016
10.13089/JKIISC.2016.26.3.613
Keywords: One-Way Network, Error Control Method, Data encryption, Session Key Updating
10.13089/JKIISC.2016.26.3.613
Keywords: One-Way Network, Error Control Method, Data encryption, Session Key Updating
An Efficient Public Trace and Revoke Scheme Using Augmented Broadcast Encryption Scheme
MoonShik Lee,
Juhee Lee,
JeoungDae Hong,
Vol. 26, No. 1, pp. 17-30,
Feb.
2016
10.13089/JKIISC.2016.26.1.17
Keywords: Broadcast Encryption Scheme, Traitor Tracing Scheme, Trace and Revoke Scheme, Augmented Broadcast Encryption Scheme, Bilinear map
10.13089/JKIISC.2016.26.1.17
Keywords: Broadcast Encryption Scheme, Traitor Tracing Scheme, Trace and Revoke Scheme, Augmented Broadcast Encryption Scheme, Bilinear map
An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking
Sung-hoon Lee,
Seung-hyun Kim,
Eui-yeob Jeong,
Dae-seon Choi,
Seung-hun Jin,
Vol. 25, No. 4, pp. 941-950,
Aug.
2015
10.13089/JKIISC.2015.25.4.941
Keywords: Internet banking, Keyboard protection, Key encryption module, javascript manipulation, Phishing attack
10.13089/JKIISC.2015.25.4.941
Keywords: Internet banking, Keyboard protection, Key encryption module, javascript manipulation, Phishing attack