Browse > Article List

논문
1 Authenticated IGMP for Controlling Access to Multicast Distribution Tree
Park, Chang-Seop;Kang, Hyun-Sun; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.3-17,
2 Design and Implementation of Secure Distribution System for Broadcasting Contents
Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.19-27,
3 Scoring Method of Fingerprint Image Quality using Classified Block-level Characteristics
Moon, Ji-Hyun;Kim, Hak-Il; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.29-40,
4 Design and Implementation of USIM Security Module for the Wireless Network Interworking
Kim, Choon-Soo; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.41-49,
5 A Design and Implementation of ROAD(RPC Object vulnerability Automatic Detector)
Yang, Jin-Seok;Kim, Tae-Ghyoon;Kim, Hyoung-Chun;Hong, Soon-Jwa; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.51-59,
6 QoS Evaluation of Streaming Media in the Secure Wireless Access Network
Kim, Jong-Woo;Shin, Seung-Wook;Lee, Sang-Duck;Han, Seung-Jo; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.61-72,
7 Analysis on TMD-Tradeoff and State Entropy Loss of Stream Cipher MICKEY
Kim, Woo-Hwan;Hong, Jin; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.73-81,
8 A Packet encryption scheme and extension of Cryptoki for connectionless packet network
Ko, Haeng-Seok;Park, Sang-Hyun;Kwon, Oh-Seok; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.83-92,
9 Lightweight IP Traceback Mechanism on IPv6 Network Environment
Heo, Joon;Kang, Myung-Soo;Hong, Choong-Seon; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.93-102,
10 A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks
Choi, Jae-Duck;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.103-114,
11 New Simple Power Analysis on scalar multiplication based on sABS recoding
Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.115-123,
12 Source-Location Privacy in Wireless Sensor Networks
Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.125-137,
13 Anonymous Remote User Authentication Scheme with Smart Card
Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.139-144,
14 Security Analysis on the Implementation Vulnerabilities of I-PIN
Choi, Youn-Sung;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.17, no.2, pp.145-185,