Browse > Article List

논문
1 Algorithm for The Relative Phase Shifts between PN Sequences Generated by 90/150 Cellular Automata
Cho, Sung-Jin;Choi, Un-Sook;Kim, Han-Doo; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.3-10,
2 Authenticated Identity-based Key Agreement Protocols in a Multiple Independent PKG Environment
Lee Hoonjung;Kim Hyunsook;Kim Sangjin;Oh Heekuck; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.11-27,
3 Lightweight Packet Authentication for Access Control in IEEE 802.11
Lee, Keun-Soon;Kim, Hyo-Jin;Song, Joo-Seok; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.29-38,
4 Design and Implementation of the Semi-automated Evaluation Workflow Management System(Sa-EWMS)
Kang Yeon-hee;Kim Jung-dae;Lee Gang-soo; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.39-50,
5 Monitoring System of File Outflow through Storage Devices and Printers
Choi Joo-ho;Rhew Sung-yul; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.51-60,
6 Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility
Lee Goo-Yeon;Lee Yong;Kim Hwa-Jong;Jeong Choong-Kyo;Lee Dong-Eun; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.61-70,
7 RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service attack
Kang, Jeon-Il;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.71-82,
8 A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS
Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.83-92,
9 An Watermarking Algorithm for Multimodal Biometric Systems
Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Chung, Yong-Wha;Moon, Ki-Young; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.93-100,
10 Public Key Cryptosystem Based on Jordan Form
Lee, Hee-Jung; / Korea Institute of Information Security and Cryptology , v.15, no.4, pp.101-105,