|
1 |
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
Park, Chang-Seop;Kang, Hyun-Sun;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.3-17,
|
|
2 |
Design and Implementation of Secure Distribution System for Broadcasting Contents
Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.19-27,
|
|
3 |
Scoring Method of Fingerprint Image Quality using Classified Block-level Characteristics
Moon, Ji-Hyun;Kim, Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.29-40,
|
|
4 |
Design and Implementation of USIM Security Module for the Wireless Network Interworking
Kim, Choon-Soo;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.41-49,
|
|
5 |
A Design and Implementation of ROAD(RPC Object vulnerability Automatic Detector)
Yang, Jin-Seok;Kim, Tae-Ghyoon;Kim, Hyoung-Chun;Hong, Soon-Jwa;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.51-59,
|
|
6 |
QoS Evaluation of Streaming Media in the Secure Wireless Access Network
Kim, Jong-Woo;Shin, Seung-Wook;Lee, Sang-Duck;Han, Seung-Jo;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.61-72,
|
|
7 |
Analysis on TMD-Tradeoff and State Entropy Loss of Stream Cipher MICKEY
Kim, Woo-Hwan;Hong, Jin;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.73-81,
|
|
8 |
A Packet encryption scheme and extension of Cryptoki for connectionless packet network
Ko, Haeng-Seok;Park, Sang-Hyun;Kwon, Oh-Seok;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.83-92,
|
|
9 |
Lightweight IP Traceback Mechanism on IPv6 Network Environment
Heo, Joon;Kang, Myung-Soo;Hong, Choong-Seon;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.93-102,
|
|
10 |
A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks
Choi, Jae-Duck;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.103-114,
|
|
11 |
New Simple Power Analysis on scalar multiplication based on sABS recoding
Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.115-123,
|
|
12 |
Source-Location Privacy in Wireless Sensor Networks
Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.125-137,
|
|
13 |
Anonymous Remote User Authentication Scheme with Smart Card
Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.139-144,
|
|
14 |
Security Analysis on the Implementation Vulnerabilities of I-PIN
Choi, Youn-Sung;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.17, no.2, pp.145-185,
|
|