• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Encryption ]" (11)
  1. 1. Design Blockchain as a Service and Smart Contract with Secure Top-k Search that Improved Accuracy
    Hobin Jang, Ji Young Chun, Ik Rae Jeong, Geontae Noh, Vol. 24, No. 5, pp. 85-96, Oct. 2023
    10.7472/jksii.2023.24.5.85
    Keywords: earchable Encryption, Top-k Search, Privacy Preserving, Blockchain as a Service, Smart Contract
  2. 2. An Encrypted Botnet C&C Communication Method in Bitcoin Network
    Kibeom Kim, Youngho Cho, Vol. 23, No. 5, pp. 103-110, Oct. 2022
    10.7472/jksii.2022.23.5.103
    Keywords: Bitcoin Network, Botnet C&C Communication, Encryption, Cyber Threat
  3. 3. Study on Threshold Scheme based Secure Secret Sharing P2P System
    Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
    10.7472/jksii.2022.23.3.21
    Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication
  4. 4. Frame security method in physical layer using OFB over Gigabit Ethernet Network
    Sung-yeal Im, Vol. 22, No. 5, pp. 17-26, Oct. 2021
    10.7472/jksii.2021.22.5.17
    Keywords: ethernet, Encryption, AES, OFB
  5. 5. An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security
    Seungil Sonh, Min-Goo Kang, Vol. 21, No. 3, pp. 11-19, Jun. 2020
    10.7472/jksii.2020.21.3.11
    Keywords: TEA, XTEA, XXTEA, Symmetric Block Cipher, Encryption, Decryption, HDL Design
  6. 6. Design of Encryption/Decryption IP for Lightweight Encryption LEA
    Seungil Sonh, Vol. 18, No. 5, pp. 1-8, Oct. 2017
    10.7472/jksii.2017.18.5.01
    Keywords: LEA(Lightweight Encryption Algorithm), Symmetric Block Cipher, Encryption, Decryption, HDL Design
  7. 7. Study on WP-IBE compliant Mobile IPSec
    Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
    10.7472/jksii.2013.14.5.11
    Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption
  8. 8. Study on Improvement of Weil Pairing IBE for Secret Document Distribution
    Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
    10.7472/jksii.2012.13.2.59
    Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing
  9. 9. A Study of Selective Encryption for Images using Tree Structures
    Myung-Mook Han, Geum-Sil Kim, Vol. 10, No. 6, pp. 219-228, Dec. 2009
    Keywords: Quad tree, Zero tree, Selective encryption, Wavelet image compression
  10. 10. RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates
    Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
    Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication