|
1 |
ID-based Proxy Signature Scheme from the Bilinear Map
이정연;천정희;김태성;진승헌;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.3-11,
|
|
2 |
Design of a Secure Web-mail System based on End-to-End
전철우;이종후;이상호;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.13-29,
|
|
3 |
Link-State Routing Security Mechanism based on Double Hash Chain
유병익;임정미;유선영;박창섭;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.31-40,
|
|
4 |
User Revocation Scheme for Reducing the Computational Overheads in Multicast Environment
강현선;박철훈;이병선;박창섭;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.41-47,
|
|
5 |
A New Universally Verifiable and Receipt-free Electronic Voting Scheme Using Only One-way Untappable Channels
조진현;김상진;오희국;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.49-61,
|
|
6 |
Jointly Unsigncryptable Signcryption Schemes
구재형;이동훈;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.63-68,
|
|
7 |
Providing Payment Atomicity Using Verifiable Encryption
최형섭;김상진;오희국;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.69-80,
|
|
8 |
Implementation of Hybrid Smartcard Using Multi Encryption Method
이성은;장홍종;박인재;한선영;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.81-89,
|
|
9 |
A new discrete logarithm problem with public parameter key-size reduction
박영호;오상호;주학수;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.91-98,
|
|
10 |
Anomaly Detection Scheme Using Data Mining Methods
박광진;유황빈;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.99-106,
|
|
11 |
Efficient mutual authentication and key distribution protocol for cdma2000 packet data service
신상욱;류희수;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.107-114,
|
|
12 |
SAD : Web Session Anomaly Detection based on Bayesian Estimation
조상현;김한성;이병희;차성덕;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.115-125,
|
|
13 |
A Fast Method for Computing Multiplcative Inverses in GF(2 ) Using Normal Bases
장용희;권용진;
/
Korea Institute of Information Security and Cryptology
, v.13, no.2, pp.127-132,
|
|