Browse > Article List

논문
1 New Efficient Scalar Multiplication Algorithms Based on Montgomery Ladder Method for Elliptic Curve Cryptosystems
Cho, Sung-Min;Seo, Seog-Chung;Kim, Tae-Hyun;Park, Yung-Ho;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.3-19,
2 DPA-Resistant Low-Area Design of AES S-Box Inversion
Kim, Hee-Seok;Han, Dong-Guk;Kim, Tae-Hyun;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.21-28,
3 Polymorphic Wonn Detection Using A Fast Static Analysis Approach
Oh, Jin-Tae;Kim, Dae-Won;Kim, Ik-Kyun;Jang, Jong-Soo;Jeon, Yong-Hee; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.29-39,
4 Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks
Seo, Hee-Suk; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.41-49,
5 The Traffic Analysis of P2P-based Storm Botnet using Honeynet
Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.51-61,
6 Estimating Direct Costs of Enterprises by Personal Information Security Breaches
Yoo, Jin-Ho;Jie, Sang-Ho;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.63-75,
7 Considering Information Security Professionals' Career to Analyze Knowledge and Skills Requirements
Yoo, Hye-Won;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.77-89,
8 UML 2.0 Statechart based Modeling and Analysis of Finite State Model for Cryptographic Module Validation
Lee, Gang-soo;Jeong, Jae-Goo;Kou, Kab-seung; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.91-103,
9 Self Generable Conditionally Anonymous Authentication System for VANET
Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.105-114,
10 Profiling of Cyber-crime by Psychological View
Lim, Chae-Ho;Kim, Jee-Young;Choi, Jin-Hyuk; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.115-124,
11 Rule-base Expert System for Privacy Violation Certainty Estimation
Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.125-135,
12 The Considerable Security Issues on the Security Enforcement of Cryptographic Technology in Finance Fields
Kim, Young-Tae;Lee, Su-Mi;Noh, Bong-Nam; / Korea Institute of Information Security and Cryptology , v.19, no.4, pp.137-142,