|
1 |
Measure of the loss resulting from the threat in the University
이현숙;변진욱;기주희;이동훈;임종인;박영우;윤재석;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.3-14,
|
|
2 |
Development on the Operating Technique for Delta CRL
김락현;엄희정;염흥열;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.15-27,
|
|
3 |
An Aggregate Detection Method for Improved Sensitivity using Correlation of Heterogeneous Intrusion Detection Sensors
김용민;김민수;김홍근;노봉남;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.29-39,
|
|
4 |
A RBAC Model Considering the Characteristics of the Adhocracy Organization
Shim, Won-Bo;Park, Seog;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.41-53,
|
|
5 |
On the Security of reduced versions of 3-pass HAVAL
박상우;성수학;지성택;윤이중;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.55-66,
|
|
6 |
Design of a Strong Authentication Mechanism using Public-Key based on Kerberos
김은환;전문석;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.67-76,
|
|
7 |
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
문덕재;황경덕;이원일;이상진;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.77-85,
|
|
8 |
The Secure Chip for Software Illegal Copy Protection
오명신;한승조;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.87-98,
|
|
9 |
Improved Elliptic Scalar Multiplication Algorithms Secure Against Side-Channel Attacks
임채훈;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.99-114,
|
|
10 |
Efficient Multi-Exponentiation and Its Application
임채훈;
/
Korea Institute of Information Security and Cryptology
, v.12, no.4, pp.115-126,
|
|