|
1 |
Memory-efficient Public Key Encryption with Keyword Search in Server
Kwon, Eun-Jeong;Seo, Jae-Woo;Lee, Pil-Joong;Park, Young-Man;Lee, Hae-Gyu;Kim, Yeong-Heon;Chong, Hak-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.3-15,
|
|
2 |
Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure
Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Park, Young-Ho;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.17-25,
|
|
3 |
Security Analysis on the Full-Round SCO-1
Jeong, Ki-Tae;Lee, Chang-Hoon;Kim, Jong-Sung;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.27-35,
|
|
4 |
Differential Cryptanalysis of a 20-Round Reduced SMS4 Block Cipher
Kim, Tae-Hyun;Kim, Jong-Sung;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.37-44,
|
|
5 |
The Related-Key Attack on Grain-v1
Lee, Yu-Seop;Jung, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.45-52,
|
|
6 |
An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization
Kang, Ju-Sung;An, A-Ron;Hong, Do-Won;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.53-68,
|
|
7 |
Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality
Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.69-78,
|
|
8 |
A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment
Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.79-91,
|
|
9 |
Development of Template Compensation Algorithm for Interoperable Fingerprint Recognition using Taylor Series
Jang, Ji-Hyeon;Kim, Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.93-102,
|
|
10 |
Designing Reliable P2P Transmission Mechanism Against MITM Attack
Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.103-109,
|
|
11 |
An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services
Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.111-122,
|
|
12 |
The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness
Kim, Jong-Ki;Kang, Da-Yeon;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.123-133,
|
|
13 |
A Study on Risk Analysis Methode Using Case-Based Reasoning
Lee, Hyeak-Ro;Ahn, Seong-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.135-141,
|
|
14 |
Proposal for Service Model for Internet Identity Management
Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.143-152,
|
|
15 |
Image-based CAPTCHA Using Multi-Image Composition and Its Secure Operation
Kang, Jeon-Il;Maeng, Young-Je;Kim, Koon-Soon;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.153-166,
|
|
16 |
Improvement of AACS Security Framework with Access Control to Personal Contents
Kim, Dae-Youb;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.167-174,
|
|
17 |
Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment
Park, Bo-Ra;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.175-185,
|
|
18 |
Countermeasures to the Vulnerability of the Keyboard Hardware
Jeong, Tae-Young;Yim, Kang-Bin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.4, pp.187-194,
|
|