|
1 |
Structure Analysis of ARS Cryptoprocessor based on Network Environment
Yun, Yeon-Sang;Jo, Kwang-Doo;Han, Seon-Kyoung;You, Young-Gap;Kim, Yong-Dae;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.3-11,
|
|
2 |
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous
Seo Dae-Hee;Lee Im-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.13-24,
|
|
3 |
A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System
Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.25-33,
|
|
4 |
A Study on the Phishing Attack Protection using RUL Spoofing
Min Dong-og;Shon Tae-shik;Moon Jong-sub;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.35-45,
|
|
5 |
A New Method for Detecting Trapdoors in Smart Cards with Timing and Power Analysis
Lee Jung Youp;Jun Eun-A;Jung Seok Won;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.47-57,
|
|
6 |
Efficient authenticate protocol for very Low-Cost RFID
Choi Eun Young;Choi Dong Hee;Lim Jong In;Lee Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.59-71,
|
|
7 |
Password Authenticated Joux's Key Exchange Protocol
Lee Sang-gon;Hitcock Yvonne;Park Young-ho;Moon Sang-jae;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.73-92,
|
|
8 |
A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization
Choi Yoon-Hee;Choi Tae-Sun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.93-103,
|
|
9 |
Responsibility and Credit: New Members of the Authentication Family?
Park, Dong-Gook;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.105-114,
|
|
10 |
MIPv6 Binding Update Protocol Secure Against both Redirect and DoS Attacks
Kang Hyun-Sun;Park Chang-Seop;
/
Korea Institute of Information Security and Cryptology
, v.15, no.5, pp.115-124,
|
|