|
1 |
Performance Improvement of Cert-Validation of Certification based on FM Subcarrier Broadcasting
장홍종;이성은;이정현;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.3-13,
|
|
2 |
A Technique for Detecting Malicious Java Applet Using Java-Methods Substitution
이승수;오형근;배병철;고재영;박춘식;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.15-22,
|
|
3 |
IC Card Security System for CEPS in Internet
Lee, Jong-Hoo;Ra, Eun-Ju;Baek, Sang-Soo;Ji, Seok-Jin;Lee, Yong;Ryu, Jae-Chul;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.23-37,
|
|
4 |
A New framework for IP Traceback : Inference of Logical Topology by Measuring Packet Losses
이준엽;이승형;양훈기;고재영;강철오;정주영;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.39-47,
|
|
5 |
Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication
박현미;강상승;최영근;김순자;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.49-59,
|
|
6 |
The Proposal of Security Evaluation Criteria for PKI Systems in Korea
심주걸;박택진;이철원;원동호;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.61-76,
|
|
7 |
A Study on a Binary Random Sequence Generator with Two Characteristic Polynomials
김대엽;주학수;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.77-85,
|
|
8 |
Cellular Automata based on VLSI architecture over GF()
전준철;김현성;이형목;유기영;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.87-94,
|
|
9 |
Extended Interactive Hashing Protocol
홍도원;장구영;류희수;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.95-102,
|
|
10 |
A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem
오수현;이승우;심경아;양형규;원동호;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.103-118,
|
|
11 |
A Identity Escrow mechanism supporting key recovery
이용호;이임영;김주한;문기영;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.119-128,
|
|
12 |
Network based Intrusion Detection System using Adaptive Resonance Theory 2
김진원;노태우;문종섭;고재영;최대식;한광택;
/
Korea Institute of Information Security and Cryptology
, v.12, no.3, pp.129-139,
|
|