Browse > Article List

논문
1 Measure of the loss resulting from the threat in the University
이현숙;변진욱;기주희;이동훈;임종인;박영우;윤재석; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.3-14,
2 Development on the Operating Technique for Delta CRL
김락현;엄희정;염흥열; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.15-27,
3 An Aggregate Detection Method for Improved Sensitivity using Correlation of Heterogeneous Intrusion Detection Sensors
김용민;김민수;김홍근;노봉남; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.29-39,
4 A RBAC Model Considering the Characteristics of the Adhocracy Organization
Shim, Won-Bo;Park, Seog; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.41-53,
5 On the Security of reduced versions of 3-pass HAVAL
박상우;성수학;지성택;윤이중;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.55-66,
6 Design of a Strong Authentication Mechanism using Public-Key based on Kerberos
김은환;전문석; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.67-76,
7 Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
문덕재;황경덕;이원일;이상진;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.77-85,
8 The Secure Chip for Software Illegal Copy Protection
오명신;한승조; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.87-98,
9 Improved Elliptic Scalar Multiplication Algorithms Secure Against Side-Channel Attacks
임채훈; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.99-114,
10 Efficient Multi-Exponentiation and Its Application
임채훈; / Korea Institute of Information Security and Cryptology , v.12, no.4, pp.115-126,