Browse > Article List

논문
1 The Study of technique to find and prove vulnerabilities in ActiveX Control
Sohn, Ki-Wook;Kim, Su-Yong; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.3-12,
2 A Source-Level Discovery Methodology for Vulnerabilities of Linux Kernel Variables
Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik;Kim Jaekwang; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.13-25,
3 A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments
Kim, Bae-Hyun;Ryoo, In-Tae; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.27-35,
4 Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows
Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.37-47,
5 A Dynamic ID Allocation Protocol for High-Performance RFID Tag
Park Jin-Sung;Choi Myung-Ryul; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.49-58,
6 Distributed Certificate Authority under the GRID-Location Aided Routing Protocol
Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.59-69,
7 Analysis of Server's Computational Cost for Multicast Batch Rekeying Scheme
Park Chang-Seop;Lee Gyu-Won; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.71-80,
8 Improvement in efficiency and privacy on BCP public key cryptosystem
Youn Taek-Young;Park Young-Ho;Lim Jong In; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.81-92,
9 Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme
Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.93-103,
10 Maximal Algebraic Degree of the Inverse of Linearized Polynomial
Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.105-110,
11 Period of Streamcipher Edon80
Hong, Jin;Park, Sang-Woo; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.111-117,
12 A Public Key Encryption Scheme Using Algebraic-Geometry Codes
Lee Jung-Keun;Kim Jaeheon;Park Sangwoo; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.119-125,
13 Efficient Password-based Key Exchange Protocol for Two users Registered in a Server
Shin Seong-chul;Lee Sung-woon; / Korea Institute of Information Security and Cryptology , v.15, no.6, pp.127-133,