Browse > Article List

논문
1 ID-based Proxy Signature Scheme from the Bilinear Map
이정연;천정희;김태성;진승헌; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.3-11,
2 Design of a Secure Web-mail System based on End-to-End
전철우;이종후;이상호; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.13-29,
3 Link-State Routing Security Mechanism based on Double Hash Chain
유병익;임정미;유선영;박창섭; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.31-40,
4 User Revocation Scheme for Reducing the Computational Overheads in Multicast Environment
강현선;박철훈;이병선;박창섭; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.41-47,
5 A New Universally Verifiable and Receipt-free Electronic Voting Scheme Using Only One-way Untappable Channels
조진현;김상진;오희국; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.49-61,
6 Jointly Unsigncryptable Signcryption Schemes
구재형;이동훈; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.63-68,
7 Providing Payment Atomicity Using Verifiable Encryption
최형섭;김상진;오희국; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.69-80,
8 Implementation of Hybrid Smartcard Using Multi Encryption Method
이성은;장홍종;박인재;한선영; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.81-89,
9 A new discrete logarithm problem with public parameter key-size reduction
박영호;오상호;주학수; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.91-98,
10 Anomaly Detection Scheme Using Data Mining Methods
박광진;유황빈; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.99-106,
11 Efficient mutual authentication and key distribution protocol for cdma2000 packet data service
신상욱;류희수; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.107-114,
12 SAD : Web Session Anomaly Detection based on Bayesian Estimation
조상현;김한성;이병희;차성덕; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.115-125,
13 A Fast Method for Computing Multiplcative Inverses in GF(2$^{m}$ ) Using Normal Bases
장용희;권용진; / Korea Institute of Information Security and Cryptology , v.13, no.2, pp.127-132,