Browse > Article List

논문
1 User Transparent File Encryption Mechanisms at Kernel Level
Kim Jae-Hwan;Park Tae-Kyou;Cho Gi-Hwan; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.3-16,
2 A Behavior based Detection for Malicious Code Using Obfuscation Technique
Park Nam-Youl;Kim Yong-Min;Noh Bong-Nam; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.17-28,
3 Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network
Jang Kun-Won;Shin Dong-Gyu;Jun Moon-Seog; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.29-38,
4 An Access Control Model for Privacy Protection using Purpose Classification
Na Seok-Hyun;Park Seog; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.39-52,
5 A Study of Formalized Presentation of Worm based on time-based Behavioral sequences
Lee Min-Soo;Shon Tae-Shik;Cho Sang-Hyun;Kim Dong-Soo;Seo Jung-Taek;Sohn Ki-Wook;Moon Jong-Sub; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.53-64,
6 Design and implementation of port scan detection improvement and algorithm connected with attack detection in IDS
Park Seong-Chul;Ko Han-Seok; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.65-76,
7 A Study on RFID Privacy Protection in Insecure Channel
Park Jang-Su;Lee Im-Yeong; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.77-86,
8 Conditional Access Control for Encrypted SVC Bitstream
Won Yong-Geun;Bae Tae-Meon;Ro Yong-Man; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.87-99,
9 Design of DRM Frame for Digital Contents Protection in Network
Kim Jong-Woo;Han Seung-Jo;Yang Won-Il; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.101-113,
10 Performance Evaluation of Various Normalization Methods and Score-level Fusion Algorithms for Multiple-Biometric System
Woo Na-Young;Kim Hak-Il; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.115-127,
11 Design and Implementation of BioAPI v2.0 based BSP Conformance Test Suite
Jang Ji-Hyeon;Lee Dong-Geun;Kim Jae-Sung;Kim Hak-Il; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.129-141,
12 A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack
Yoo Hyung-So;Kim Chang-Kyun;Park Il-Hwan;Moon Sang-Jae;Ha Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.143-155,
13 Privacy Framework in Ubiquitous Computing Environments
Hong Seng-Phil;Lee Chul-Soo; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.157-164,
14 An Improved Spreading Model for Internet Worms
Shin Weon;Rhee Kyung-Hvune; / Korea Institute of Information Security and Cryptology , v.16, no.3, pp.165-172,