Browse > Article List

논문
1 An Implementation and Evaluation of Junk Mail Filtering System to use the FQDN Check and personalized Quarantine Process
Kim, Sung-Chan;Jun, Moon-Seog;Choun, Jun-Ho; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.3-13,
2 Area Efficient Implementation of 32-bit Architecture of ARIA Block Cipher Using Light Weight Diffusion Layer
Ryu, Gwon-Ho;Koo, Bon-Seok;Yang, Sang-Woon;Chang, Tae-Joo; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.15-24,
3 Efficient RFID Authentication protocol for Distribution Database Environment
Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.25-35,
4 Revisiting Permutation Transformation Scheme for Cancelable Face Recognition
Kim, Koon-Soon;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.37-46,
5 A Policy-based Privacy Authorization System in the Internet Environment
Choi, Hyang-Chang;Park, Hee-Man;Lee, Seung-Yong;Noh, Bong-Nam;Lee, Hyung-Hyo; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.47-61,
6 Protecting Fingerprint Data for Remote Applications
Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.63-71,
7 Three-Party Authenticated Key Exchange Protocol using Smartcards
Jeon, Il-Soo; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.73-80,
8 A Study of Detecting Malicious Files using Similarity between Machine Code in Deleted File Slices
Lee, Dong-Ju;Lee, Suk-Bong;Kim, Min-Soo; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.81-93,
9 A Flexible Approach for Efficient Elliptic Curve Multi-Scalar Multiplication on Resource-constrained Devices
Seo, Seog-Chung;Kim, Hyung-Chan;Ramakrishna, R.S.; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.95-109,
10 Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction
Kim, Mi-Sun;Park, Kyung-Woo;Seo, Jae-Hyun; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.111-121,
11 Authenticated Quantum Secret Sharing using GHZ state swapping
Lee, Duk-Jin;Lee, Hwa-Yean;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.123-134,
12 The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network
Hong, Soon-Jwa;Park, Hyun-Dong; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.135-149,
13 Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol
Sohn, Ki-Wook;Lee, Yun-Ho;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.151-155,
14 Secure GSM User Authentication Protocol For User Privacy
Park, Mi-Og;Kim, Chang-Min; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.157-161,
15 New Constructions of Multi-level ${\mu}TESLA$ with Immediate Authentication
Lim, Chae-Hoon; / Korea Institute of Information Security and Cryptology , v.16, no.6, pp.163-167,