|
1 |
An Implementation of Database Security Using Steganography in the Web
Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.3-11,
|
|
2 |
Host Anomaly Detection of Neural Networks and Neural-fuzzy Techniques with Soundex Algorithm
Cha, Byung-Rae;Kim, Hyung-Jong;Park, Bong-Gu;Cho, Hyug-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.13-22,
|
|
3 |
A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information
Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.23-36,
|
|
4 |
Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment
Nam Seung-Jwa;Park Seog;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.37-52,
|
|
5 |
A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink
Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.53-64,
|
|
6 |
Security analysis o( proxy signature schemes based on RSA and integer factorization problems
Park Je Hong;Kang Bo Gyeong;Han Jae Woo;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.65-72,
|
|
7 |
Quantum Authentication and Key Distribution protocol based on one-time ID
Lee Hwa-Yean;Hong Chang-Ho;Lim Jong-in;Yang Hyung-Jin;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.73-80,
|
|
8 |
Authenticated Handoff with Low Latency and Traffic Management in WLAN
Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.81-94,
|
|
9 |
Guess-then-Reduce Methods for Convolution Modular Lattices
Han Daewan;Hong Jin;Yeom Yongjin;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.95-103,
|
|
10 |
The Analysis of State-Transition of SACA over GF(2p)
Cho Sung-Jin;Hwang Yoon-Hee;Kim Han-Doo;Pyo Yong-Soo;Choi Un-Sook;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.105-111,
|
|
11 |
Multi-Watermarking for Image Authentication Based on DWT Coefficients
Lee Hye-Ran;Rhee Kyung-Hyune;
/
Korea Institute of Information Security and Cryptology
, v.15, no.2, pp.113-122,
|
|