|
1 |
The Study of technique to find and prove vulnerabilities in ActiveX Control
Sohn, Ki-Wook;Kim, Su-Yong;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.3-12,
|
|
2 |
A Source-Level Discovery Methodology for Vulnerabilities of Linux Kernel Variables
Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik;Kim Jaekwang;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.13-25,
|
|
3 |
A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments
Kim, Bae-Hyun;Ryoo, In-Tae;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.27-35,
|
|
4 |
Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows
Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.37-47,
|
|
5 |
A Dynamic ID Allocation Protocol for High-Performance RFID Tag
Park Jin-Sung;Choi Myung-Ryul;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.49-58,
|
|
6 |
Distributed Certificate Authority under the GRID-Location Aided Routing Protocol
Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.59-69,
|
|
7 |
Analysis of Server's Computational Cost for Multicast Batch Rekeying Scheme
Park Chang-Seop;Lee Gyu-Won;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.71-80,
|
|
8 |
Improvement in efficiency and privacy on BCP public key cryptosystem
Youn Taek-Young;Park Young-Ho;Lim Jong In;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.81-92,
|
|
9 |
Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme
Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.93-103,
|
|
10 |
Maximal Algebraic Degree of the Inverse of Linearized Polynomial
Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.105-110,
|
|
11 |
Period of Streamcipher Edon80
Hong, Jin;Park, Sang-Woo;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.111-117,
|
|
12 |
A Public Key Encryption Scheme Using Algebraic-Geometry Codes
Lee Jung-Keun;Kim Jaeheon;Park Sangwoo;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.119-125,
|
|
13 |
Efficient Password-based Key Exchange Protocol for Two users Registered in a Server
Shin Seong-chul;Lee Sung-woon;
/
Korea Institute of Information Security and Cryptology
, v.15, no.6, pp.127-133,
|
|