Browse > Article List

논문
1 Design and implementation of Jini-based secure event service using SPKI/SDSI certificate
Park, Hee-Man;Kim, In-Su;Lee, Young-Lok;Lee, Hyung-Hyo;Noh, Bong-Nam; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.3-13,
2 Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots
Kim, Ik-Su;Kim, Myung-Ho; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.15-24,
3 Authenticated Ticket-based Binding Update Protocol for Mobile IPv6 Network
Koo, Jung-Doo;Kim, Sang-Jin;Oh, Hee-Kuck; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.25-34,
4 An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine
Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.35-46,
5 Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network
Lee, Seok-Lae;Song, Joo-Seok; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.47-57,
6 Privacy-Enhanced Subject Identification method Embedded in X.509 Certificate
Lee, Jae-Il;Park, Jong-Wook;Kim, Seung-Joo;Song, Joo-Seok; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.59-66,
7 Low-cost AES Implementation for RFID tags
Koo, Bon-Seok;Ryu, Gwon-Ho;Yang, Sang-Woon;Chang, Tae-Joo;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.67-77,
8 Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies
Kim, Jong-Ki;Jeon, Jin-Hwan; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.79-92,
9 Extending the OMA DRM Framework for Supporting an Active Content
Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.93-106,
10 Known-plaintext attack of the Domingo-Feller's first privacy homomorphism scheme
Lee, Moon-Sung;Hahn, Sang-Geun; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.107-111,
11 Private Pseudonym Retrieval with Controlled Traceability
Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.113-118,
12 Face Recognition Method using Individual Eigenfaces Space
Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.16, no.5, pp.119-123,