최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기스마트미디어저널 = Smart media journal, v.11 no.10, 2022년, pp.76 - 88
Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-reques...
P. Grubbs, T. Ristenpart, and V. Shmatikov,?"Why your encrypted database is not secure,"?Proc. 16th workshop Hot Topics Operating?Syst., pp. 162-168, May, 2017.
M.-S. Lacharite, B. Minaud, and K. G. Paterson,?"Improved reconstruction attacks on encrypted?data using range query leakage," Proc. IEEE?Symp. Security and Privacy, pp. 297-314, 2018.
N. Singh and P. Tiwari,(2022). "SQL Injection?Attacks, Detection Techniques on Web?Application Databases," Rising Threats in?Expert Applications and Solutions, Lecture?Notes in Networks and Systems, Vol 434,?PP.387-394, 2022.
P. Grubbs, R. McPherson, M. Naveed, T.?Ristenpart, and V. Shmatikov, "Breaking web?applications built on top of encrypted data,"?Proc. ACM SIGSAC Conf. Comput. Commun.?Security, pp. 1353-1364, Oct. 2016.
F. B. Durak, T. M. DuBuisson, and D. Cash,?"What else is revealed by order-preserving?encryption?," Proc. ACM SIGSAC Conf. Comput. Commun. Security, pp. 1155-1166,?Oct. 2016.
Microsoft, "Always Encrypted (Database?Engine)," http://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine?viewsql-server2017. (accessed Oct., 18, 2022).
G. D. Samaraweera, J. M. Chang, "Security and?Privacy Implications on Database Systems in?Big Data Era: A Survey," IEEE Tr. on?Knowledge and Data Engineering, Vol. 33, No.?1, pp. 239-258, Jan. 2021.
C. Priebe, K. Vaswani, and M. Costa,?"EnclaveDB: A Secure Database using SGX,"?Proc. IEEE Symp. Security and Privacy, pp.?264-278, San Francisco, CA, USA, May, 2018.
O. Avellaneda, A. Bachmann, A. Barbir, J.?Brenan, P. Dingle, K. H. Duffy, E. Maler, D.?Reed, and M. Sporny, "Decentralized Identity:?Where Did It Come From and Where Is It?Going?," IEEE Communications Standards?Magazine, Vol. 3, No. 4, pp. 10-13, Dec. 2019.
P. Markert, D. V. Bailey, M. Golla, M.?Durmuth, A. J. Aviv, "This PIN Can Be?Easily Guessed: Analyzing the Security of?Smartphone Unlock PINs," Proc. IEEE Symp.?Security and Privacy, pp. 286-303, San?Francisco, CA, USA, May, 2020.
S. Garg and N. Baliyan, "Comparative analysis?of Android and iOS from security viewpoint,"?Computer Science Review, Vol. 40, pp. 1-13,?May, 2021.
J. F. Brown, S. Hossain, and L. Lancor,?"Quad Swipe Pattern: A New Point-of-Entry?Security Measure for Smartphone Users,"?IEEE Access, Vol. 9, pp. 160622-160634, Dec.?2021.
S. F. Verkijika, "Understanding smartphone?security behaviors : an extension of the?protection motivation theory with anticipated?regret," Computers & Security, Vol. 77, pp.?860-870, Aug. 2018.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.