|
1 |
New Efficient Scalar Multiplication Algorithms Based on Montgomery Ladder Method for Elliptic Curve Cryptosystems
Cho, Sung-Min;Seo, Seog-Chung;Kim, Tae-Hyun;Park, Yung-Ho;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.3-19,
|
|
2 |
DPA-Resistant Low-Area Design of AES S-Box Inversion
Kim, Hee-Seok;Han, Dong-Guk;Kim, Tae-Hyun;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.21-28,
|
|
3 |
Polymorphic Wonn Detection Using A Fast Static Analysis Approach
Oh, Jin-Tae;Kim, Dae-Won;Kim, Ik-Kyun;Jang, Jong-Soo;Jeon, Yong-Hee;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.29-39,
|
|
4 |
Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks
Seo, Hee-Suk;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.41-49,
|
|
5 |
The Traffic Analysis of P2P-based Storm Botnet using Honeynet
Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.51-61,
|
|
6 |
Estimating Direct Costs of Enterprises by Personal Information Security Breaches
Yoo, Jin-Ho;Jie, Sang-Ho;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.63-75,
|
|
7 |
Considering Information Security Professionals' Career to Analyze Knowledge and Skills Requirements
Yoo, Hye-Won;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.77-89,
|
|
8 |
UML 2.0 Statechart based Modeling and Analysis of Finite State Model for Cryptographic Module Validation
Lee, Gang-soo;Jeong, Jae-Goo;Kou, Kab-seung;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.91-103,
|
|
9 |
Self Generable Conditionally Anonymous Authentication System for VANET
Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.105-114,
|
|
10 |
Profiling of Cyber-crime by Psychological View
Lim, Chae-Ho;Kim, Jee-Young;Choi, Jin-Hyuk;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.115-124,
|
|
11 |
Rule-base Expert System for Privacy Violation Certainty Estimation
Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.125-135,
|
|
12 |
The Considerable Security Issues on the Security Enforcement of Cryptographic Technology in Finance Fields
Kim, Young-Tae;Lee, Su-Mi;Noh, Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.19, no.4, pp.137-142,
|
|