|
1 |
Design and Implementation of a Traceback System based on Multi-Agents
정종민;이지율;이구연;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.3-11,
|
|
2 |
A Security Policy Statements Generation Method for Development of Protection Profile
고정호;이강수;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.13-28,
|
|
3 |
Two-factor Authenticated and Key Exchange(TAKE) Protocol in Public Wireless LANs
박영만;박상규;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.29-36,
|
|
4 |
A Model of Role Hierarchies providing Restricted Permission Inheritance
이용훈;김용민;이형효;진승헌;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.37-45,
|
|
5 |
Design and Implementation of a Secure Software Architecture for Security Patch Distribution
손태식;서정우;문종섭;서정택;임을규;이철원;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.47-62,
|
|
6 |
Implementation of A Security Token System using Fingerprint Verification
문대성;길연희;안도성;반성범;정용화;정교일;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.63-70,
|
|
7 |
Inter-Domain Verifiable Self-certified public keys
정영석;한종수;오수현;원동호;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.71-84,
|
|
8 |
Key Distribution Protocol Appropriate to Wireless Terminal Embedding IC Chip
안기범;김수진;한종수;이승우;원동호;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.85-98,
|
|
9 |
Design of International Cross Certification Model using Cross Certificate
김재중;이동훈;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.99-107,
|
|
10 |
Analysis of AKA and handover between UMTS and GSM
이세광;조승환;이옥연;서창호;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.109-127,
|
|
11 |
A Role-Based Delegation Model Using Role Hierarchy with Restricted Permission Inheritance
박종순;이영록;이형효;노봉남;조상래;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.129-138,
|
|
12 |
Design of MD5 Hash Processor with Hardware Sharing and Carry Save Addition Scheme
최병윤;박영수;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.139-149,
|
|
13 |
Anomaly Detection Method Based on The False-Positive Control
조혁현;정희택;김민수;노봉남;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.151-159,
|
|
14 |
Remark on the Security of Password Schemes
이희정;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.161-168,
|
|
15 |
A Distributed Signcryption for User Anonymity
곽동진;하재철;문상재;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.169-176,
|
|
16 |
Design and Implementation of Secure DRM System for Contents Streaming
이진흥;김태정;박지환;
/
Korea Institute of Information Security and Cryptology
, v.13, no.4, pp.177-186,
|
|