Browse > Article List

논문
1 Design and Implementation of a Traceback System based on Multi-Agents
정종민;이지율;이구연; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.3-11,
2 A Security Policy Statements Generation Method for Development of Protection Profile
고정호;이강수; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.13-28,
3 Two-factor Authenticated and Key Exchange(TAKE) Protocol in Public Wireless LANs
박영만;박상규; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.29-36,
4 A Model of Role Hierarchies providing Restricted Permission Inheritance
이용훈;김용민;이형효;진승헌; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.37-45,
5 Design and Implementation of a Secure Software Architecture for Security Patch Distribution
손태식;서정우;문종섭;서정택;임을규;이철원; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.47-62,
6 Implementation of A Security Token System using Fingerprint Verification
문대성;길연희;안도성;반성범;정용화;정교일; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.63-70,
7 Inter-Domain Verifiable Self-certified public keys
정영석;한종수;오수현;원동호; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.71-84,
8 Key Distribution Protocol Appropriate to Wireless Terminal Embedding IC Chip
안기범;김수진;한종수;이승우;원동호; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.85-98,
9 Design of International Cross Certification Model using Cross Certificate
김재중;이동훈; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.99-107,
10 Analysis of AKA and handover between UMTS and GSM
이세광;조승환;이옥연;서창호; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.109-127,
11 A Role-Based Delegation Model Using Role Hierarchy with Restricted Permission Inheritance
박종순;이영록;이형효;노봉남;조상래; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.129-138,
12 Design of MD5 Hash Processor with Hardware Sharing and Carry Save Addition Scheme
최병윤;박영수; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.139-149,
13 Anomaly Detection Method Based on The False-Positive Control
조혁현;정희택;김민수;노봉남; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.151-159,
14 Remark on the Security of Password Schemes
이희정; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.161-168,
15 A Distributed Signcryption for User Anonymity
곽동진;하재철;문상재; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.169-176,
16 Design and Implementation of Secure DRM System for Contents Streaming
이진흥;김태정;박지환; / Korea Institute of Information Security and Cryptology , v.13, no.4, pp.177-186,