|
1 |
Vulnerability of Two Password-based Key Exchange and Authentication Protocols against Off-line Password-Guessing Attacks
Shim, Kyung-Ah;Lee, Hyang-Sook;Lee, Ju-Hee;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.3-10,
|
|
2 |
A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault
Lee, Sung-Ju;Moon, Dae-Sung;Kim, Hak-Jae;Yi, Ok-Yeon;Chung, Yong-Wha;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.11-21,
|
|
3 |
System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection
Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.23-30,
|
|
4 |
Investigation of Side Channel Analysis Attacks on Financial IC Cards
Kim, Chang-Kyun;Park, Il-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.31-39,
|
|
5 |
Systolic Architecture for Digit Level Modular Multiplication/Squaring over GF( )
Lee, Jin-Ho;Kim, Hyun-Sung;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.41-47,
|
|
6 |
A Study on Hierarchical Distributed Intrusion Detection for Secure Home Networks Service
Yu, Jae-Hak;Choi, Sung-Back;Yang, Sung-Hyun;Park, Dai-Hee;Chung, Yong-Wha;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.49-57,
|
|
7 |
Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard
Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.59-65,
|
|
8 |
Encryption scheme suitable to RFID Systems based on EPC Generation2
Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.67-75,
|
|
9 |
Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System
Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.77-87,
|
|
10 |
IARAM: Internet Attack Representation And Mapping Mechanism for a Simulator
Lee, Cheol-Won;Kim, Jung-Sik;Kim, Dong-Kyu;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.89-102,
|
|
11 |
An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions
Maeng, Young-Jae;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.103-114,
|
|
12 |
Security Analysis on the Home Trading System Service and Proposal of the Evaluation Criteria
Lee, Yun-Young;Choi, Hae-Lahng;Han, Jeong-Hoon;Hong, Su-Min;Lee, Sung-Jin;Shin, Dong-Hwi;Won, Dong-Ho;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.115-137,
|
|
13 |
Information security auditing Framework in Industrial control system
Lee, Chul-Soo;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.139-148,
|
|
14 |
A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization
Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk;
/
Korea Institute of Information Security and Cryptology
, v.18, no.1, pp.149-159,
|
|