Digital Library


Search: "[ keyword: Encryption ]" (85)
    A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest
    Dongyeol Son, Jimin Kim, Cheongmin Ji, Kangseok Kim, Kihyung Kim, Manpyo Hong, Vol. 28, No. 2, pp. 311-325, Apr. 2018
    10.13089/JKIISC.2018.28.2.311
    Keywords: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead

    An Application Obfuscation Method Using Security Token for Encryption in Android
    JinSeop Shin, Jaehwan Ahn, Vol. 27, No. 6, pp. 1457-1465, Dec. 2017
    10.13089/JKIISC.2017.27.6.1457
    Keywords: Android, Encryption, security token

    Accountable Authority Revocable Identity-Based Encryption
    Suri Choi, Dong Hoon Lee, Vol. 27, No. 6, pp. 1281-1293, Dec. 2017
    10.13089/JKIISC.2017.27.6.1281
    Keywords: Identity-Based Encryption, Revocable IBE, Accountable Authority IBE, PKI

    Masking-Based Block Cipher LEA Resistant to Side Channel Attacks
    Eunsoo Park, Soohyun Oh, Jaecheol Ha, Vol. 27, No. 5, pp. 1023-1032, Oct. 2017
    10.13089/JKIISC.2017.27.5.1023
    Keywords: Cyber-Physical System, IoT, Lightweight Encryption, Block Cipher LEA, AtoB Masking

    Study on Memory Data Encryption of Windows Hibernation File
    Kyoungho Lee, Wooho Lee, Bongnam Noh, Vol. 27, No. 5, pp. 1013-1022, Oct. 2017
    10.13089/JKIISC.2017.27.5.1013
    Keywords: physical memory, Memory Encryption, Hibernation File

    Efficient Outsourced Multiparty Computations Based on Partially Homomorphic Encryption
    Hasoo Eun, Ubaidullah Ubaidullah, Heekuck Oh, Vol. 27, No. 3, pp. 477-488, Jun. 2017
    10.13089/JKIISC.2017.27.3.477
    Keywords: Multiparty Computations, Outsourced MPCs, Proxy Re-Encryptions, Delegating Computations

    Implementation and Performance Enhancement of Arithmetic Adder for Fully Homomorphic Encrypted Data
    Kyongjin Seo, Pyong Kim, Younho Lee, Vol. 27, No. 3, pp. 413-426, Jun. 2017
    10.13089/JKIISC.2017.27.3.413
    Keywords: Fully homomorphic encryption, Adder, Operations Over Encrypted Data, Applied Cryptography, Security

    Error Control Protocol and Data Encryption Mechanism in the One-Way Network
    Jaecheol Ha, Kihyun Kim, Vol. 26, No. 3, pp. 613-622, Jun. 2016
    10.13089/JKIISC.2016.26.3.613
    Keywords: One-Way Network, Error Control Method, Data encryption, Session Key Updating

    An Efficient Public Trace and Revoke Scheme Using Augmented Broadcast Encryption Scheme
    MoonShik Lee, Juhee Lee, JeoungDae Hong, Vol. 26, No. 1, pp. 17-30, Feb. 2016
    10.13089/JKIISC.2016.26.1.17
    Keywords: Broadcast Encryption Scheme, Traitor Tracing Scheme, Trace and Revoke Scheme, Augmented Broadcast Encryption Scheme, Bilinear map

    An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking
    Sung-hoon Lee, Seung-hyun Kim, Eui-yeob Jeong, Dae-seon Choi, Seung-hun Jin, Vol. 25, No. 4, pp. 941-950, Aug. 2015
    10.13089/JKIISC.2015.25.4.941
    Keywords: Internet banking, Keyboard protection, Key encryption module, javascript manipulation, Phishing attack