Browse > Article List

논문
1 Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments
Kang Myung-Hee;Ryou Hwang-Bin; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.3-12,
2 A Practical Privacy-Preserving Multi-Party Computation Protocol for Solving Linear Systems
Yi Ok-Yeon;Hong Do-Won;Kang Ju-Sung; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.13-24,
3 Improved Fast Correlation Attack on the Shrinking and Self-Shrinking generators
Jeong Ki-Tae;Sung Jae-Chul;Lee Sang-Jin;Kim Jae-Heon;Park Sang-Woo;Hong Seok-Hie; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.25-32,
4 Design of a Policy based Privacy Protection System using Encryption Techniques
Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.33-43,
5 Implementation of Digital Document Management DRM System with OMA Structure
Shin Young-Chan;Choi Hyo-Sik;Kim Yong-Goo;Choi Seoko-Jin;Ryou Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.45-54,
6 An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control
Kim Jung-Sun;Kim Min-Soo;No Bong-Nam; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.55-70,
7 A Key Management Scheme for Commodity Sensor Networks
Kim Young-Ho;Lee Hwa-Seong;Lee Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.71-80,
8 A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment
Seo Dae-Hee;Lee Im-Yeong; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.81-94,
9 The Modified IPv6 NDP Mechanism for Preventing IP Spoofing
Kim Ji-Hong;Nah Jae-Hoon; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.95-103,
10 Modified SMPO for Type-II Optimal Normal Basis
Yang Dong-Jin;Chang Nam-Su;Ji Sung-Yeon;Kim Chang-Han; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.105-111,
11 Steganographic Method on Spatial Domain Using Modular Characteristic
Park Young-Ran;Shin Sang-Uk; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.113-119,
12 Improved Password Change Protocol Using One-way Function
Jeon Il-Soo; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.121-127,
13 A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method
Yoo Hyung-So;Kim Chang-Kyun;Park Il-Hwan;Moon Sang-Jae;Ha Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.16, no.2, pp.129-139,