Browse > Article List

논문
1 Scalable Hierarchical Group Key Establishment using Diffie-Hallman Key Exchange
박영희;정병천;이윤호;김희열;이재원;윤현수; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.3-15,
2 Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols
권태경;임선간;박해룡; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.17-37,
3 Efficient Re-Establishment Mechanism of Diameter Security Association lost in MIP Application
유희종;김말희;김현곤; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.39-48,
4 Watermarking Technique Using Exchanging Wavelet Coefficients
주낙근;이재현;김동서; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.49-56,
5 An Evaluation Method for Security Policy Model Based on Common Criteria
김상호;임춘성; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.57-67,
6 Case Study for Information System Vulnerability Assessment through Improved OCTAVE Approach
김기윤;양동구; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.69-79,
7 Security Verification of Wireless Remote Control System Using CPN
이문구; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.81-90,
8 Efficient Masquerade Detection Based on SVM
김한성;권영희;차성덕; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.91-104,
9 Simple and Efficient Authenticated Key Agreement Protocol
이성운;유기영; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.105-112,
10 A WTLS Handshake protocol against Active Attack
Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.113-127,
11 Dual Signature Scheme to provide efficient message decryption
김근옥;남정현;김승주;원동호; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.129-136,
12 Stream Cipher Algorithm using the Modified S-box
박미옥;최연희;전문석; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.137-145,
13 A New Forward-Secure Signature Scheme based on GDH groups
강보경;박제홍;한상근; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.147-157,
14 On a construction of resilient functions using a hyperelliptic curve with genus 2
최춘수;이민섭; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.159-168,
15 Randomization of Elliptic Curve Secret Key to Efficiently Resist Power Analysis
장상운;정석원;박영호; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.169-177,
16 Design of an Efficient Bit-Parallel Multiplier using Trinomials
정석원;이선옥;김창한; / Korea Institute of Information Security and Cryptology , v.13, no.5, pp.179-187,