Browse > Article List

논문
1 Performance Improvement of Cert-Validation of Certification based on FM Subcarrier Broadcasting
장홍종;이성은;이정현; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.3-13,
2 A Technique for Detecting Malicious Java Applet Using Java-Methods Substitution
이승수;오형근;배병철;고재영;박춘식; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.15-22,
3 IC Card Security System for CEPS in Internet
Lee, Jong-Hoo;Ra, Eun-Ju;Baek, Sang-Soo;Ji, Seok-Jin;Lee, Yong;Ryu, Jae-Chul; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.23-37,
4 A New framework for IP Traceback : Inference of Logical Topology by Measuring Packet Losses
이준엽;이승형;양훈기;고재영;강철오;정주영; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.39-47,
5 Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication
박현미;강상승;최영근;김순자; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.49-59,
6 The Proposal of Security Evaluation Criteria for PKI Systems in Korea
심주걸;박택진;이철원;원동호; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.61-76,
7 A Study on a Binary Random Sequence Generator with Two Characteristic Polynomials
김대엽;주학수;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.77-85,
8 Cellular Automata based on VLSI architecture over GF($2^m$)
전준철;김현성;이형목;유기영; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.87-94,
9 Extended Interactive Hashing Protocol
홍도원;장구영;류희수; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.95-102,
10 A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem
오수현;이승우;심경아;양형규;원동호; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.103-118,
11 A Identity Escrow mechanism supporting key recovery
이용호;이임영;김주한;문기영; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.119-128,
12 Network based Intrusion Detection System using Adaptive Resonance Theory 2
김진원;노태우;문종섭;고재영;최대식;한광택; / Korea Institute of Information Security and Cryptology , v.12, no.3, pp.129-139,