Digital Library


Search: "[ keyword: Information leakage ]" (10)
    Study on the Risk of Database Information Leakage Based on Memory Analysis
    , , , , , Vol. 35, No. 3, pp. 649-657, Jun. 2025
    10.13089/JKIISC.2025.35.3.649

    Mobile Application Privacy Leak Detection and Security Enhancement Research
    김성진, 허준범, Vol. 29, No. 1, pp. 195-203, Jan. 2019
    10.13089/JKIISC.2019.29.1.195
    Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security

    A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea
    Gyoo Gun Lim, Mei Na Liu, Jung Mi Lee, Vol. 28, No. 1, pp. 215-227, Feb. 2018
    10.13089/JKIISC.2018.28.1.215
    Keywords: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model

    Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing
    Dongyoung Koo, Vol. 27, No. 4, pp. 981-992, Aug. 2017
    10.13089/JKIISC.2017.27.4.981
    Keywords: side channel, Deduplication, hash tree, message size, Information leakage

    Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident
    Jae-Ha Eom, Min-Jeong Kim, Vol. 26, No. 2, pp. 463-474, Apr. 2016
    10.13089/JKIISC.2016.26.2.463
    Keywords: Personal information leakage, Stock Return, Valuation, Investors trading behavior and Performance

    A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage
    Min-Jeong Kim, Namgil Heo, Jinho Yoo, Vol. 26, No. 1, pp. 275-284, Feb. 2016
    10.13089/JKIISC.2016.26.1.275
    Keywords: Personal information leakage, information security company, Stock price

    A method for quantitative measuring the degree of damage by personal information leakage
    Pyong Kim, Younho Lee, Timur Khudaybergenov, Vol. 25, No. 2, pp. 395-410, Apr. 2015
    10.13089/JKIISC.2015.25.2.395
    Keywords: Personal Information Exposure, quantitative measure for the risk by personal information leakage, Personal information security, security for SNS, Security

    A study on the security policy improvement using the big data
    Song-Young Kim, Joseph Kim, Jong-In Lim, Kyung-Ho Lee, Vol. 23, No. 5, pp. 969-976, Oct. 2013
    10.13089/JKIISC.2013.23.5.969
    Keywords: Big data, Internal Information Leakage, Data Mining

    Development of Mobile Alarm System using Message Tree for Personal Information Management
    Eun-Young Jang, Hyung-Jong Kim, Jun Hwang, Vol. 19, No. 3, pp. 153-162, Jun. 2009
    10.13089/JKIISC.2009.19.3.153
    Keywords: Mobile Alarm, Personal information leakage, Message Tree

    A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System
    Park Ju-Sung, Kang Jeonil, Nyang Dae-Hun, Vol. 15, No. 5, pp. 25-34, Oct. 2005
    10.13089/JKIISC.2005.15.5.25
    Keywords: RFID, Privacy, Information leakage, Tag, collision