|
1 |
An Implementation and Evaluation of Junk Mail Filtering System to use the FQDN Check and personalized Quarantine Process
Kim, Sung-Chan;Jun, Moon-Seog;Choun, Jun-Ho;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.3-13,
|
|
2 |
Area Efficient Implementation of 32-bit Architecture of ARIA Block Cipher Using Light Weight Diffusion Layer
Ryu, Gwon-Ho;Koo, Bon-Seok;Yang, Sang-Woon;Chang, Tae-Joo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.15-24,
|
|
3 |
Efficient RFID Authentication protocol for Distribution Database Environment
Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.25-35,
|
|
4 |
Revisiting Permutation Transformation Scheme for Cancelable Face Recognition
Kim, Koon-Soon;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.37-46,
|
|
5 |
A Policy-based Privacy Authorization System in the Internet Environment
Choi, Hyang-Chang;Park, Hee-Man;Lee, Seung-Yong;Noh, Bong-Nam;Lee, Hyung-Hyo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.47-61,
|
|
6 |
Protecting Fingerprint Data for Remote Applications
Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.63-71,
|
|
7 |
Three-Party Authenticated Key Exchange Protocol using Smartcards
Jeon, Il-Soo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.73-80,
|
|
8 |
A Study of Detecting Malicious Files using Similarity between Machine Code in Deleted File Slices
Lee, Dong-Ju;Lee, Suk-Bong;Kim, Min-Soo;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.81-93,
|
|
9 |
A Flexible Approach for Efficient Elliptic Curve Multi-Scalar Multiplication on Resource-constrained Devices
Seo, Seog-Chung;Kim, Hyung-Chan;Ramakrishna, R.S.;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.95-109,
|
|
10 |
Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction
Kim, Mi-Sun;Park, Kyung-Woo;Seo, Jae-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.111-121,
|
|
11 |
Authenticated Quantum Secret Sharing using GHZ state swapping
Lee, Duk-Jin;Lee, Hwa-Yean;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.123-134,
|
|
12 |
The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network
Hong, Soon-Jwa;Park, Hyun-Dong;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.135-149,
|
|
13 |
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol
Sohn, Ki-Wook;Lee, Yun-Ho;Won, Dong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.151-155,
|
|
14 |
Secure GSM User Authentication Protocol For User Privacy
Park, Mi-Og;Kim, Chang-Min;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.157-161,
|
|
15 |
New Constructions of Multi-level with Immediate Authentication
Lim, Chae-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.16, no.6, pp.163-167,
|
|