Browse > Article List

논문
1 A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems
이기정;권태경;황성운;윤기송; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.3-13,
2 Security Analysis of ElGamal-Type Signature Scheme Using Integer Decomposition
이익권;김동렬; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.15-22,
3 A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine
서정우;손태식;서정택;문종섭; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.23-33,
4 Self-Reputation System in P2P Networks
조남수;김우환;윤효진;이인석;천정희;김태성;진승헌;추경균; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.35-47,
5 Authenticated quantum key distribution protocol
이화연;홍창호;이덕진;양형진;임종인; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.49-55,
6 Construction of UOWHF: New Parallel Domain Extender with Optimal Key Size
Wonil Lee;Donghoon Chang; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.57-68,
7 Efficient Threshold Schnorr's Signature Scheme
양대헌;권태경; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.69-74,
8 A Characteristic of Nonlinear Filter Models based on LFSMs
Hong, Jin;Lee, Dong-Hoon;Ji, Sung-Taek; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.75-83,
9 A Study on activation and improvement of the Government PKI
추경균;김종배;류성열; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.85-100,
10 Design and Implementation of Quantitative Risk Analysis System for ISP Network
문호건;최진기;김형순; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.101-111,
11 An Evaluation Method on Intrusion Detection System using Fuzzy Integrals
김미혜; / Korea Institute of Information Security and Cryptology , v.14, no.2, pp.113-121,