Digital Library[ Search Result ]
Search : "[ keyword: information protection ]" (6)
k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous Query Processing
Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system
Im Jae Deog Yu Jun Seog Kim Jeong Nyeo
Vol. 10, No. 4, pp. 387-396, Aug. 2003
10.3745/KIPSTC.2003.10.4.387
Vol. 10, No. 4, pp. 387-396, Aug. 2003
