|
1 |
Design and implementation of Jini-based secure event service using SPKI/SDSI certificate
Park, Hee-Man;Kim, In-Su;Lee, Young-Lok;Lee, Hyung-Hyo;Noh, Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.3-13,
|
|
2 |
Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots
Kim, Ik-Su;Kim, Myung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.15-24,
|
|
3 |
Authenticated Ticket-based Binding Update Protocol for Mobile IPv6 Network
Koo, Jung-Doo;Kim, Sang-Jin;Oh, Hee-Kuck;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.25-34,
|
|
4 |
An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine
Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.35-46,
|
|
5 |
Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network
Lee, Seok-Lae;Song, Joo-Seok;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.47-57,
|
|
6 |
Privacy-Enhanced Subject Identification method Embedded in X.509 Certificate
Lee, Jae-Il;Park, Jong-Wook;Kim, Seung-Joo;Song, Joo-Seok;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.59-66,
|
|
7 |
Low-cost AES Implementation for RFID tags
Koo, Bon-Seok;Ryu, Gwon-Ho;Yang, Sang-Woon;Chang, Tae-Joo;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.67-77,
|
|
8 |
Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies
Kim, Jong-Ki;Jeon, Jin-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.79-92,
|
|
9 |
Extending the OMA DRM Framework for Supporting an Active Content
Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.93-106,
|
|
10 |
Known-plaintext attack of the Domingo-Feller's first privacy homomorphism scheme
Lee, Moon-Sung;Hahn, Sang-Geun;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.107-111,
|
|
11 |
Private Pseudonym Retrieval with Controlled Traceability
Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.113-118,
|
|
12 |
Face Recognition Method using Individual Eigenfaces Space
Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.16, no.5, pp.119-123,
|
|