Digital Library
Search: "[ keyword: Protection ]" (88)
An adaptive digital watermark using the spatial masking
,
Vol. 9, No. 3, pp. 39-52,
Jun.
1999
10.13089/JKIISC.1999.9.3.39
Keywords: Digital watermarking, copyright protection, spread spectrum, spatial masking

Keywords: Digital watermarking, copyright protection, spread spectrum, spatial masking
A Security Evaluation Model On Multiple Protection Countermeasures
,
Vol. 8, No. 3, pp. 3-16,
Jun.
1998
10.13089/JKIISC.1998.8.3.3
Keywords: Security Evaluation, Protection, Effectiveness, Risk Analysis

Keywords: Security Evaluation, Protection, Effectiveness, Risk Analysis
A Study on PIMS Controls for PII Outsourcing Management under the Cloud Service Environment
Dae-Ha Park,
Keun-Hee Han,
Vol. 23, No. 6, pp. 1267-1276,
Dec.
2013
10.13089/JKIISC.2013.23.6.1267
Keywords: Cloud service, Privacy, PII Protection, ISMS, PIMS, PIPL, Outsourcing Control

Keywords: Cloud service, Privacy, PII Protection, ISMS, PIMS, PIPL, Outsourcing Control
Study on Anti-Phishing Solutions, Related Researches and Future Directions
Ji Sun Shin,
Vol. 23, No. 6, pp. 1037-1048,
Dec.
2013
10.13089/JKIISC.2013.23.6.1037
Keywords: Phishing, Anti-Phising Solutions, Security, Usability, User Protection

Keywords: Phishing, Anti-Phising Solutions, Security, Usability, User Protection
Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies
Jae-Geun Lee,
Sang-Ug Kang,
Heung-Youl Youm,
Vol. 23, No. 4, pp. 767-780,
Aug.
2013
10.13089/JKIISC.2013.23.4.767
Keywords: Privacy Policy, Personal Information Protection, Data Analysis, Statistics

Keywords: Privacy Policy, Personal Information Protection, Data Analysis, Statistics
A Study on Consigned Party Management System Enhancement for Personal Information Protection
Tae-Hun Kang,
Jong-In Lim,
Vol. 23, No. 4, pp. 781-802,
Aug.
2013
10.13089/JKIISC.2013.23.4.781
Keywords: Personal Information Protection, Consigned Party

Keywords: Personal Information Protection, Consigned Party
Dynamic User Reliability Evaluation Scheme for Social Network Service
Changhoon Lee,
Youngman Jung,
Jaewook Jung,
Dongho Won,
Vol. 23, No. 2, pp. 157-168,
Apr.
2013
10.13089/JKIISC.2013.23.2.157
Keywords: social network service, Reliability evaluation, SNS security, Privacy Protection

Keywords: social network service, Reliability evaluation, SNS security, Privacy Protection
A tamper resistance software mechanism using MAC function and dynamic link key
Jae-Hong Park,
Sung-Hoon Kim,
Dong-Hoon Lee,
Vol. 23, No. 1, pp. 11-18,
Feb.
2013
10.13089/JKIISC.2013.23.1.11
Keywords: application program protection, Reverse engineering, software protection, code obfuscation

Keywords: application program protection, Reverse engineering, software protection, code obfuscation
A method for the protection of the message in social network service(SNS) using access control and hash-chain
Hanjae Jeong,
Dongho Won,
Vol. 23, No. 1, pp. 81-88,
Feb.
2013
10.13089/JKIISC.2013.23.1.81
Keywords: Social network services, SNS, Hash-Chain, message protection

Keywords: Social network services, SNS, Hash-Chain, message protection
Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems
Dongjin Kim,
Youn-Sik Jeong,
Gwangyeul Yun,
Haeyoung Yoo,
Seong-Je Cho,
Giyoun Kim,
Jinyoung Lee,
Hong-Geun Kim,
Taeseung Lee,
Jae-Myung Lim,
Dongho Won,
Vol. 22, No. 5, pp. 1191-1204,
Oct.
2012
10.13089/JKIISC.2012.22.5.1191
Keywords: Vulnerability, Security Testing, Threat Analysis, Penetration Testing, Self-protection, Non-bypassability

Keywords: Vulnerability, Security Testing, Threat Analysis, Penetration Testing, Self-protection, Non-bypassability