Browse > Article List

논문
1 Structure Analysis of ARS Cryptoprocessor based on Network Environment
Yun, Yeon-Sang;Jo, Kwang-Doo;Han, Seon-Kyoung;You, Young-Gap;Kim, Yong-Dae; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.3-11,
2 A Study on Scalable Bluetooth Piconet for Secure Ubiquitous
Seo Dae-Hee;Lee Im-Yeong; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.13-24,
3 A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System
Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.25-33,
4 A Study on the Phishing Attack Protection using RUL Spoofing
Min Dong-og;Shon Tae-shik;Moon Jong-sub; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.35-45,
5 A New Method for Detecting Trapdoors in Smart Cards with Timing and Power Analysis
Lee Jung Youp;Jun Eun-A;Jung Seok Won; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.47-57,
6 Efficient authenticate protocol for very Low-Cost RFID
Choi Eun Young;Choi Dong Hee;Lim Jong In;Lee Dong Hoon; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.59-71,
7 Password Authenticated Joux's Key Exchange Protocol
Lee Sang-gon;Hitcock Yvonne;Park Young-ho;Moon Sang-jae; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.73-92,
8 A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization
Choi Yoon-Hee;Choi Tae-Sun; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.93-103,
9 Responsibility and Credit: New Members of the Authentication Family?
Park, Dong-Gook; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.105-114,
10 MIPv6 Binding Update Protocol Secure Against both Redirect and DoS Attacks
Kang Hyun-Sun;Park Chang-Seop; / Korea Institute of Information Security and Cryptology , v.15, no.5, pp.115-124,