Digital Library
Search: "[ keyword: RMI ]" (17)
-
Chohee Bae, Jiwoo Lee, KyungLyul Lee, Vol. 24, No. 3, pp. 79-88, Jun. 2023
10.7472/jksii.2023.24.3.79
Keywords: communication data, privacy in internet, self-determination of personal information, improved legislative measures, geo-fencing technology, warrant of digital evidence -
Jun-Hyeok Choi, Mun-Suk Kim, Vol. 23, No. 3, pp. 13-20, Jun. 2022
10.7472/jksii.2022.23.3.13
Keywords: mmWave, 802.11ay, beamforming, MU-MIMO, Deep Learning -
Ye-Jin Choi, Kyoung-jin Kim, Vol. 21, No. 1, pp. 95-102, Feb. 2020
10.7472/jksii.2020.21.1.95
Keywords: Blockchain, Hyperledger Fabric, Healthcare, Permissioned blockchain -
Youn-chul Kang, Jong-chang Ahn, Vol. 19, No. 6, pp. 9-20, Dec. 2018
10.7472/jksii.2018.19.6.9
Keywords: Personal information security management system; Non-conformity trends; Business continuity management system; Certification audit; Information security management system; Control area -
Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
10.7472/jksii.2017.18.6.75
Keywords: Permissioned blockchain, role-based access control, Medical data -
Byung-Hye Lee, Vol. 17, No. 2, pp. 97-108, Apr. 2016
10.7472/jksii.2016.17.2.97
Keywords: Social Media, Social Capital, Determinant Factors, trust -
Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
10.7472/jksii.2016.17.1.91
Keywords: Mobile Security, android security, permissions, least privilege -
Kyoung-Jae Lee, Han-Shin Jo, Vol. 16, No. 6, pp. 1-10, Dec. 2015
10.7472/jksii.2015.16.6.01
Keywords: Heterogeneous networks, Multiple radio access technology, Adjacent channel interference ratio, Guard band, deterministic calculations -
Ilhwan Kim, Jaeho Sung, Vol. 16, No. 4, pp. 141-148, Aug. 2015
10.7472/jksii.2015.16.4.141
Keywords: IT, Personal Information, Personal Information Protection Act, Right to Informational Self Determination, E Government -
Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
10.7472/jksii.2014.15.3.79
Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI