Browse > Article List

논문
1 Video Watermarking Scheme with Adaptive Embedding in 3D-DCT domain
Park Hyun;Han Ji-Seok;Moon Young-Shik; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.3-12,
2 A Role-Based Access Control Model ensuring Confidentiality and Integrity
Byun Chang-Woo;Park Seog; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.13-29,
3 Asymmetric Temporal Privilege Management on Untrusted Storage Server
Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.31-42,
4 An Efficient MIPv4 Registration Protocol With Minimal Overheads Of AAA
Kang Hyun-Sun;Park Chang-Seop; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.43-52,
5 A study on Kerberos Authentication mechanism
Kim Cheol-hyun;Lee Yon-Sik; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.53-64,
6 Fast Scalar Multiplication Algorithm on Elliptic Curve over Optimal Extension Fields
Chung Byungchun;Lee Soojin;Hong Seong-Min;Yoon Hyunsoo; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.65-76,
7 An Efficiency Improved ID-based Tripartite Key Agreement Protocol
Park Young-Ho;Rhee Kyung-Hyune; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.77-89,
8 Characteristic Classification and Correlational Analysis of Source-level Vulnerabilities in Linux Kernel
Ko Kwangsun;Jang In-Sook;Kang Yong-hyeog;Lee Jin-Seok;Eom Young Ik; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.91-101,
9 Improved Impossible Differential Attacks on 6-round AES
Kim Jongsung;Hong Seokhie;Lee Sangjin;Eun Hichun; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.103-107,
10 Security analysis of a threshold proxy signature scheme using a self-certified public key
Park, Je-Hong;Kang, Bo-Gyeong;Hahn, Sang-Geun; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.109-114,
11 Related-Key Attacks on Reduced Rounds of SHACAL-2
Kim Jongsung;Kim Guil;Lee Sangjin;Lim Jongin; / Korea Institute of Information Security and Cryptology , v.15, no.3, pp.115-126,