|
1 |
A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems
이기정;권태경;황성운;윤기송;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.3-13,
|
|
2 |
Security Analysis of ElGamal-Type Signature Scheme Using Integer Decomposition
이익권;김동렬;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.15-22,
|
|
3 |
A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine
서정우;손태식;서정택;문종섭;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.23-33,
|
|
4 |
Self-Reputation System in P2P Networks
조남수;김우환;윤효진;이인석;천정희;김태성;진승헌;추경균;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.35-47,
|
|
5 |
Authenticated quantum key distribution protocol
이화연;홍창호;이덕진;양형진;임종인;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.49-55,
|
|
6 |
Construction of UOWHF: New Parallel Domain Extender with Optimal Key Size
Wonil Lee;Donghoon Chang;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.57-68,
|
|
7 |
Efficient Threshold Schnorr's Signature Scheme
양대헌;권태경;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.69-74,
|
|
8 |
A Characteristic of Nonlinear Filter Models based on LFSMs
Hong, Jin;Lee, Dong-Hoon;Ji, Sung-Taek;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.75-83,
|
|
9 |
A Study on activation and improvement of the Government PKI
추경균;김종배;류성열;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.85-100,
|
|
10 |
Design and Implementation of Quantitative Risk Analysis System for ISP Network
문호건;최진기;김형순;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.101-111,
|
|
11 |
An Evaluation Method on Intrusion Detection System using Fuzzy Integrals
김미혜;
/
Korea Institute of Information Security and Cryptology
, v.14, no.2, pp.113-121,
|
|