Browse > Article List

논문
1 An Implementation of Database Security Using Steganography in the Web
Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.3-11,
2 Host Anomaly Detection of Neural Networks and Neural-fuzzy Techniques with Soundex Algorithm
Cha, Byung-Rae;Kim, Hyung-Jong;Park, Bong-Gu;Cho, Hyug-Hyun; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.13-22,
3 A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information
Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.23-36,
4 Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment
Nam Seung-Jwa;Park Seog; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.37-52,
5 A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink
Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.53-64,
6 Security analysis o( proxy signature schemes based on RSA and integer factorization problems
Park Je Hong;Kang Bo Gyeong;Han Jae Woo; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.65-72,
7 Quantum Authentication and Key Distribution protocol based on one-time ID
Lee Hwa-Yean;Hong Chang-Ho;Lim Jong-in;Yang Hyung-Jin; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.73-80,
8 Authenticated Handoff with Low Latency and Traffic Management in WLAN
Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.81-94,
9 Guess-then-Reduce Methods for Convolution Modular Lattices
Han Daewan;Hong Jin;Yeom Yongjin; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.95-103,
10 The Analysis of State-Transition of SACA over GF(2p)
Cho Sung-Jin;Hwang Yoon-Hee;Kim Han-Doo;Pyo Yong-Soo;Choi Un-Sook; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.105-111,
11 Multi-Watermarking for Image Authentication Based on DWT Coefficients
Lee Hye-Ran;Rhee Kyung-Hyune; / Korea Institute of Information Security and Cryptology , v.15, no.2, pp.113-122,