Browse > Article List

논문
1 A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System
Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.3-13,
2 A Certificate Verification Method based on the Attribute Certificates
Park ChongHwa;Kim JiHong;Lee ChulSoo;Kim Dongkyoo; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.15-24,
3 Generation of Maximum Length Cellular Automata
Choi Un-Sook;Cho Sung-Jin; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.25-30,
4 An Implementation of NEIS′DB Security Using RBAC based on PMI
Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.31-45,
5 Analysis of Developing Methodology on the Security Software by Comparing Function for Security Protocol Code Generation Tools
Jang Seung-Ju;Ryu Dae-hyun;Lee Chul-Sool;Park Il-Hwan; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.47-56,
6 Status-Based RFID Authentication Protocol
Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.57-68,
7 Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach
Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.69-78,
8 A Hardware Implementation for Real-Time Fingerprint Identification
Kim Kichul;Kim Min;Chung Yongwha;Pan Sung Bum; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.79-89,
9 A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-Base Security Policy
Ahn Joung Choul; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.91-103,
10 Message Authentication Code based on k-invertible Matrices
Lee Hee Jung;Kim Tae Gwon; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.105-110,
11 Analysis of hash functions based on cellular automata
Jeong Kitae;Lee Jesang;Chang Donghoon;Sung Jaechul;Lee Sangjin; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.111-123,
12 Elliptic Curve Scalar Multiplication Resistant against Side Channel Attacks
Kim Tae Hyun;Jang Sang-Woon;Kim Woong Hee;Park Young-Ho; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.125-134,
13 A spam mail blocking method using URL frequency analysis
Baek Ki-young;Lee Chul-soo;Ryou Jae-cheol; / Korea Institute of Information Security and Cryptology , v.14, no.6, pp.135-148,