|
1 |
Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System
Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.3-12,
|
|
2 |
Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol
Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.13-26,
|
|
3 |
2-Subset Difference Scheme for Broadcast Encryption
Jang Ji-Yong;Song Joo-Seok;Nyang Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.27-32,
|
|
4 |
A Novel Redundant Binary Montgomery Multiplier and Hardware Architecture
Lim Dae-Sung;Chang Nam-Su;Ji Sung-Yeon;Kim Sung-Kyoung;Lee Sang-Jin;Koo Bon-Seok;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.33-41,
|
|
5 |
Secure Component Composition for Practical Systems
Lee Eun-Young;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.43-57,
|
|
6 |
Development of Side Channel Attack Analysis Tool on Smart Card
Han Dong-Ho;Park Jea-Hoon;Ha Jae-Cheol;Lee Sung-Jae;Moon Sang-Jae;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.59-68,
|
|
7 |
An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence
Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.69-81,
|
|
8 |
A New Parallel Multiplier for Type II Optimal Normal Basis
Kim Chang-Han;Jang Sang-Woon;Lim Jong-In;Ji Sung-Yeon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.83-89,
|
|
9 |
Analysis of Level of Difficulty of Fingerprint Database by matching Orientation field
Park Noh-Jun;Moon Ji-Hyun;Kim Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.91-103,
|
|
10 |
Statistical Analysis for Assessment of Fingerprint Sensors
Nam Jung-Woo;Kim Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.105-118,
|
|
11 |
A Voter Verifiable Receipt in Electronic Voting with Improved Reliability
Lee Kwang-Woo;Lee Yun-Ho;Won Dong-Ho;Kim Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.119-126,
|
|
12 |
Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks
Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.127-138,
|
|
13 |
Secure Authenticated key Exchange Protocol using Signcryption Scheme
Kim Rack-Hyun;Youm Heung-Youl;
/
Korea Institute of Information Security and Cryptology
, v.16, no.4, pp.139-146,
|
|