Digital Library
Search: "[ keyword: PC ]" (19)
A Study on Authentication Process in Smartphone Electronic Financial Services
김한우,
이근영,
임종인,
권헌영,
Vol. 28, No. 3, pp. 579-590,
May.
2018
10.13089/JKIISC.2018.28.3.579
Keywords: authentication, appcard, identity proofing, electronic financial services, authentication, appcard, identity proofing, electronic financial services
10.13089/JKIISC.2018.28.3.579
Keywords: authentication, appcard, identity proofing, electronic financial services, authentication, appcard, identity proofing, electronic financial services
Efficient Outsourced Multiparty Computations Based on Partially Homomorphic Encryption
Hasoo Eun,
Ubaidullah Ubaidullah,
Heekuck Oh,
Vol. 27, No. 3, pp. 477-488,
Jun.
2017
10.13089/JKIISC.2017.27.3.477
Keywords: Multiparty Computations, Outsourced MPCs, Proxy Re-Encryptions, Delegating Computations
10.13089/JKIISC.2017.27.3.477
Keywords: Multiparty Computations, Outsourced MPCs, Proxy Re-Encryptions, Delegating Computations
Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network
Jae-Yoon Shim,
June-Kyoung Lee,
Vol. 26, No. 5, pp. 1305-1312,
Oct.
2016
10.13089/JKIISC.2016.26.5.1305
Keywords: Smart Factory, DPI(Deep Packet Inspection), OPC-UA, Protocol Gateway, Convergence Security
10.13089/JKIISC.2016.26.5.1305
Keywords: Smart Factory, DPI(Deep Packet Inspection), OPC-UA, Protocol Gateway, Convergence Security
Threatening privacy by identifying appliances and the pattern of the usage from electric signal data
Jae yeon Cho,
Ji Won Yoon,
Vol. 25, No. 5, pp. 1001-1010,
Oct.
2015
10.13089/JKIISC.2015.25.5.1001
Keywords: Smart Meter, Privacy, PCA, k-NN Classifier, 10-fold Cross Validation
10.13089/JKIISC.2015.25.5.1001
Keywords: Smart Meter, Privacy, PCA, k-NN Classifier, 10-fold Cross Validation
Study on Disaster Recovery Efficiency of Terminal PC in Financial Company
Seung-Chul Yi,
Joon-Seob Yoon,
Kyung-Ho Lee,
Vol. 25, No. 1, pp. 211-224,
Feb.
2015
10.13089/JKIISC.2015.25.1.211
Keywords: Terminal, PC, desktop, disaster, Recovery, Cyber Attack, malcode, APT, BCP, DRP
10.13089/JKIISC.2015.25.1.211
Keywords: Terminal, PC, desktop, disaster, Recovery, Cyber Attack, malcode, APT, BCP, DRP
Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)
Hyun Tak Chae,
Sang-Jin Lee,
Vol. 24, No. 5, pp. 961-968,
Oct.
2014
10.13089/JKIISC.2014.24.5.961
Keywords: Personal Information, PC security solution, log analysis
10.13089/JKIISC.2014.24.5.961
Keywords: Personal Information, PC security solution, log analysis
The Analysis of Face Recognition Rate according to Distance and Interpolation using PCA in Surveillance System
Hae-Min Moon,
Keun-Chang Kwak,
Sung-Bum Pan,
Vol. 21, No. 6, pp. 153-160,
Dec.
2011
10.13089/JKIISC.2011.21.6.153
Keywords: PCA, interpolation, Face Recongnition
10.13089/JKIISC.2011.21.6.153
Keywords: PCA, interpolation, Face Recongnition
Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis
Jung-Woo Ha,
Huy-Kang Kim,
Jong-In Lim,
Vol. 21, No. 4, pp. 61-76,
Aug.
2011
10.13089/JKIISC.2011.21.4.61
Keywords: Zomebie PC, Worm, Virus
10.13089/JKIISC.2011.21.4.61
Keywords: Zomebie PC, Worm, Virus
Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap
Hyun-Cheol Jeong,
Huy-Kang Kim,
Sang-Jin Lee,
Joo-Hyung Oh,
Vol. 21, No. 3, pp. 101-116,
Jun.
2011
10.13089/JKIISC.2011.21.3.101
Keywords: Botnet, Zombie PC, Spam botnet
10.13089/JKIISC.2011.21.3.101
Keywords: Botnet, Zombie PC, Spam botnet