|
1 |
User Transparent File Encryption Mechanisms at Kernel Level
Kim Jae-Hwan;Park Tae-Kyou;Cho Gi-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.3-16,
|
|
2 |
A Behavior based Detection for Malicious Code Using Obfuscation Technique
Park Nam-Youl;Kim Yong-Min;Noh Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.17-28,
|
|
3 |
Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network
Jang Kun-Won;Shin Dong-Gyu;Jun Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.29-38,
|
|
4 |
An Access Control Model for Privacy Protection using Purpose Classification
Na Seok-Hyun;Park Seog;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.39-52,
|
|
5 |
A Study of Formalized Presentation of Worm based on time-based Behavioral sequences
Lee Min-Soo;Shon Tae-Shik;Cho Sang-Hyun;Kim Dong-Soo;Seo Jung-Taek;Sohn Ki-Wook;Moon Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.53-64,
|
|
6 |
Design and implementation of port scan detection improvement and algorithm connected with attack detection in IDS
Park Seong-Chul;Ko Han-Seok;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.65-76,
|
|
7 |
A Study on RFID Privacy Protection in Insecure Channel
Park Jang-Su;Lee Im-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.77-86,
|
|
8 |
Conditional Access Control for Encrypted SVC Bitstream
Won Yong-Geun;Bae Tae-Meon;Ro Yong-Man;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.87-99,
|
|
9 |
Design of DRM Frame for Digital Contents Protection in Network
Kim Jong-Woo;Han Seung-Jo;Yang Won-Il;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.101-113,
|
|
10 |
Performance Evaluation of Various Normalization Methods and Score-level Fusion Algorithms for Multiple-Biometric System
Woo Na-Young;Kim Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.115-127,
|
|
11 |
Design and Implementation of BioAPI v2.0 based BSP Conformance Test Suite
Jang Ji-Hyeon;Lee Dong-Geun;Kim Jae-Sung;Kim Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.129-141,
|
|
12 |
A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack
Yoo Hyung-So;Kim Chang-Kyun;Park Il-Hwan;Moon Sang-Jae;Ha Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.143-155,
|
|
13 |
Privacy Framework in Ubiquitous Computing Environments
Hong Seng-Phil;Lee Chul-Soo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.157-164,
|
|
14 |
An Improved Spreading Model for Internet Worms
Shin Weon;Rhee Kyung-Hvune;
/
Korea Institute of Information Security and Cryptology
, v.16, no.3, pp.165-172,
|
|