Browse > Article List

논문
1 Efficient Bit-Parallel Polynomial Basis Multiplier for Repeated Polynomials
Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.3-15,
2 Security Analysis of Two Certificateless Signature Schemes
Lee, Ju-Hee;Shim, Kyung-Ah;Lee, Hyang-Sook; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.17-22,
3 Efficient RSA-Based PAKE Procotol for Low-Power Devices
Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.23-35,
4 Efficient Message Authentication Scheme for VANET
Yoo, Young-Jun;Lee, Jun-Ho;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.37-47,
5 Real-time Integrity for Vehicle Black Box System
Kim, Yun-Gyu;Kim, Bum-Han;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.49-61,
6 Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm
Gil, Kwang-Eun;Baek, Yi-Roo;Kim, Hwan-Koo;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.63-70,
7 An Efficient Anonymous Routing Protocol Without Using Onion Technique in MANET
Lee, Sung-Yun;Oh, Hee-Kuck;Kim, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.71-82,
8 Strong Yoking-Proof Protocol using Light-Weighted MAC
Cho, Chang-Hyun;Lee, Jae-Sik;Kim, Jae-Woo;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.83-92,
9 A Ticket-based Authentication Mechanism Suitable for Fast 802.11 Handoff which use CAPWAP Architecture
Park, Chang-Seop;Woo, Byung-Duk; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.93-103,
10 Breaking character-based CAPTCHA using color information
Kim, Sung-Ho;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.105-112,
11 The Study on the Security Model for ActiveX Control Management through Security Authentication
Park, Sung-Yong;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.113-119,
12 The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy
Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.121-134,
13 The Threat Analysis and Security Guide for Private Information in Web Log
Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.135-144,
14 A Study on the Secure Plan of Security in SCADA Systems
Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.145-152,
15 An Empirical Research on Human Factor Management Indicators for Information Security
Cha, In-Hwan;Kim, Jung-Duk; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.153-160,
16 Technique and Implementation of Secure Downloadable Conditional Access System
Kang, Seong-Ku;Park, Jong-Youl;Paik, Eui-Hyun;Park, Choon-Sik;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.161-174,
17 Estimating Information Security Risk-Using Fuzzy Number Compromising Quantitative and Qualitative Methods
Pak, Ro-Jin;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.175-184,
18 The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack
Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.185-190,
19 Security analysis of Chang-Lee-Chiu's anonymous authentication scheme
Youn, Taek-Young;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.191-194,
20 An Interactive Diffie-Hellman Problem and Its Application to Identification Scheme
Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.19, no.6, pp.195-199,