Browse > Article List

논문
1 Vulnerability of Two Password-based Key Exchange and Authentication Protocols against Off-line Password-Guessing Attacks
Shim, Kyung-Ah;Lee, Hyang-Sook;Lee, Ju-Hee; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.3-10,
2 A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault
Lee, Sung-Ju;Moon, Dae-Sung;Kim, Hak-Jae;Yi, Ok-Yeon;Chung, Yong-Wha; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.11-21,
3 System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection
Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.23-30,
4 Investigation of Side Channel Analysis Attacks on Financial IC Cards
Kim, Chang-Kyun;Park, Il-Hwan; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.31-39,
5 Systolic Architecture for Digit Level Modular Multiplication/Squaring over GF($2^m$)
Lee, Jin-Ho;Kim, Hyun-Sung; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.41-47,
6 A Study on Hierarchical Distributed Intrusion Detection for Secure Home Networks Service
Yu, Jae-Hak;Choi, Sung-Back;Yang, Sung-Hyun;Park, Dai-Hee;Chung, Yong-Wha; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.49-57,
7 Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard
Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.59-65,
8 Encryption scheme suitable to RFID Systems based on EPC Generation2
Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.67-75,
9 Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System
Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.77-87,
10 IARAM: Internet Attack Representation And Mapping Mechanism for a Simulator
Lee, Cheol-Won;Kim, Jung-Sik;Kim, Dong-Kyu; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.89-102,
11 An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions
Maeng, Young-Jae;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.103-114,
12 Security Analysis on the Home Trading System Service and Proposal of the Evaluation Criteria
Lee, Yun-Young;Choi, Hae-Lahng;Han, Jeong-Hoon;Hong, Su-Min;Lee, Sung-Jin;Shin, Dong-Hwi;Won, Dong-Ho;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.115-137,
13 Information security auditing Framework in Industrial control system
Lee, Chul-Soo; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.139-148,
14 A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization
Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk; / Korea Institute of Information Security and Cryptology , v.18, no.1, pp.149-159,