Digital Library
Search: "[ keyword: Encryption ]" (11)
-
1. Design Blockchain as a Service and Smart Contract with Secure Top-k Search that Improved AccuracyHobin Jang, Ji Young Chun, Ik Rae Jeong, Geontae Noh, Vol. 24, No. 5, pp. 85-96, Oct. 2023
10.7472/jksii.2023.24.5.85
Keywords: earchable Encryption, Top-k Search, Privacy Preserving, Blockchain as a Service, Smart Contract -
Kibeom Kim, Youngho Cho, Vol. 23, No. 5, pp. 103-110, Oct. 2022
10.7472/jksii.2022.23.5.103
Keywords: Bitcoin Network, Botnet C&C Communication, Encryption, Cyber Threat -
Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
10.7472/jksii.2022.23.3.21
Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication -
Sung-yeal Im, Vol. 22, No. 5, pp. 17-26, Oct. 2021
10.7472/jksii.2021.22.5.17
Keywords: ethernet, Encryption, AES, OFB -
Seungil Sonh, Min-Goo Kang, Vol. 21, No. 3, pp. 11-19, Jun. 2020
10.7472/jksii.2020.21.3.11
Keywords: TEA, XTEA, XXTEA, Symmetric Block Cipher, Encryption, Decryption, HDL Design -
Seungil Sonh, Vol. 18, No. 5, pp. 1-8, Oct. 2017
10.7472/jksii.2017.18.5.01
Keywords: LEA(Lightweight Encryption Algorithm), Symmetric Block Cipher, Encryption, Decryption, HDL Design -
Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
10.7472/jksii.2013.14.5.11
Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption -
Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
10.7472/jksii.2012.13.2.59
Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing -
Myung-Mook Han, Geum-Sil Kim, Vol. 10, No. 6, pp. 219-228, Dec. 2009
Keywords: Quad tree, Zero tree, Selective encryption, Wavelet image compression -
Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication