|
1 |
Video Watermarking Scheme with Adaptive Embedding in 3D-DCT domain
Park Hyun;Han Ji-Seok;Moon Young-Shik;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.3-12,
|
|
2 |
A Role-Based Access Control Model ensuring Confidentiality and Integrity
Byun Chang-Woo;Park Seog;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.13-29,
|
|
3 |
Asymmetric Temporal Privilege Management on Untrusted Storage Server
Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.31-42,
|
|
4 |
An Efficient MIPv4 Registration Protocol With Minimal Overheads Of AAA
Kang Hyun-Sun;Park Chang-Seop;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.43-52,
|
|
5 |
A study on Kerberos Authentication mechanism
Kim Cheol-hyun;Lee Yon-Sik;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.53-64,
|
|
6 |
Fast Scalar Multiplication Algorithm on Elliptic Curve over Optimal Extension Fields
Chung Byungchun;Lee Soojin;Hong Seong-Min;Yoon Hyunsoo;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.65-76,
|
|
7 |
An Efficiency Improved ID-based Tripartite Key Agreement Protocol
Park Young-Ho;Rhee Kyung-Hyune;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.77-89,
|
|
8 |
Characteristic Classification and Correlational Analysis of Source-level Vulnerabilities in Linux Kernel
Ko Kwangsun;Jang In-Sook;Kang Yong-hyeog;Lee Jin-Seok;Eom Young Ik;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.91-101,
|
|
9 |
Improved Impossible Differential Attacks on 6-round AES
Kim Jongsung;Hong Seokhie;Lee Sangjin;Eun Hichun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.103-107,
|
|
10 |
Security analysis of a threshold proxy signature scheme using a self-certified public key
Park, Je-Hong;Kang, Bo-Gyeong;Hahn, Sang-Geun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.109-114,
|
|
11 |
Related-Key Attacks on Reduced Rounds of SHACAL-2
Kim Jongsung;Kim Guil;Lee Sangjin;Lim Jongin;
/
Korea Institute of Information Security and Cryptology
, v.15, no.3, pp.115-126,
|
|