|
1 |
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments
Kang Myung-Hee;Ryou Hwang-Bin;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.3-12,
|
|
2 |
A Practical Privacy-Preserving Multi-Party Computation Protocol for Solving Linear Systems
Yi Ok-Yeon;Hong Do-Won;Kang Ju-Sung;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.13-24,
|
|
3 |
Improved Fast Correlation Attack on the Shrinking and Self-Shrinking generators
Jeong Ki-Tae;Sung Jae-Chul;Lee Sang-Jin;Kim Jae-Heon;Park Sang-Woo;Hong Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.25-32,
|
|
4 |
Design of a Policy based Privacy Protection System using Encryption Techniques
Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.33-43,
|
|
5 |
Implementation of Digital Document Management DRM System with OMA Structure
Shin Young-Chan;Choi Hyo-Sik;Kim Yong-Goo;Choi Seoko-Jin;Ryou Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.45-54,
|
|
6 |
An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control
Kim Jung-Sun;Kim Min-Soo;No Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.55-70,
|
|
7 |
A Key Management Scheme for Commodity Sensor Networks
Kim Young-Ho;Lee Hwa-Seong;Lee Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.71-80,
|
|
8 |
A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment
Seo Dae-Hee;Lee Im-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.81-94,
|
|
9 |
The Modified IPv6 NDP Mechanism for Preventing IP Spoofing
Kim Ji-Hong;Nah Jae-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.95-103,
|
|
10 |
Modified SMPO for Type-II Optimal Normal Basis
Yang Dong-Jin;Chang Nam-Su;Ji Sung-Yeon;Kim Chang-Han;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.105-111,
|
|
11 |
Steganographic Method on Spatial Domain Using Modular Characteristic
Park Young-Ran;Shin Sang-Uk;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.113-119,
|
|
12 |
Improved Password Change Protocol Using One-way Function
Jeon Il-Soo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.121-127,
|
|
13 |
A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method
Yoo Hyung-So;Kim Chang-Kyun;Park Il-Hwan;Moon Sang-Jae;Ha Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.16, no.2, pp.129-139,
|
|