|
1 |
Efficient Bit-Parallel Polynomial Basis Multiplier for Repeated Polynomials
Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.3-15,
|
|
2 |
Security Analysis of Two Certificateless Signature Schemes
Lee, Ju-Hee;Shim, Kyung-Ah;Lee, Hyang-Sook;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.17-22,
|
|
3 |
Efficient RSA-Based PAKE Procotol for Low-Power Devices
Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.23-35,
|
|
4 |
Efficient Message Authentication Scheme for VANET
Yoo, Young-Jun;Lee, Jun-Ho;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.37-47,
|
|
5 |
Real-time Integrity for Vehicle Black Box System
Kim, Yun-Gyu;Kim, Bum-Han;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.49-61,
|
|
6 |
Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm
Gil, Kwang-Eun;Baek, Yi-Roo;Kim, Hwan-Koo;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.63-70,
|
|
7 |
An Efficient Anonymous Routing Protocol Without Using Onion Technique in MANET
Lee, Sung-Yun;Oh, Hee-Kuck;Kim, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.71-82,
|
|
8 |
Strong Yoking-Proof Protocol using Light-Weighted MAC
Cho, Chang-Hyun;Lee, Jae-Sik;Kim, Jae-Woo;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.83-92,
|
|
9 |
A Ticket-based Authentication Mechanism Suitable for Fast 802.11 Handoff which use CAPWAP Architecture
Park, Chang-Seop;Woo, Byung-Duk;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.93-103,
|
|
10 |
Breaking character-based CAPTCHA using color information
Kim, Sung-Ho;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.105-112,
|
|
11 |
The Study on the Security Model for ActiveX Control Management through Security Authentication
Park, Sung-Yong;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.113-119,
|
|
12 |
The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy
Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.121-134,
|
|
13 |
The Threat Analysis and Security Guide for Private Information in Web Log
Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.135-144,
|
|
14 |
A Study on the Secure Plan of Security in SCADA Systems
Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.145-152,
|
|
15 |
An Empirical Research on Human Factor Management Indicators for Information Security
Cha, In-Hwan;Kim, Jung-Duk;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.153-160,
|
|
16 |
Technique and Implementation of Secure Downloadable Conditional Access System
Kang, Seong-Ku;Park, Jong-Youl;Paik, Eui-Hyun;Park, Choon-Sik;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.161-174,
|
|
17 |
Estimating Information Security Risk-Using Fuzzy Number Compromising Quantitative and Qualitative Methods
Pak, Ro-Jin;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.175-184,
|
|
18 |
The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack
Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.185-190,
|
|
19 |
Security analysis of Chang-Lee-Chiu's anonymous authentication scheme
Youn, Taek-Young;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.191-194,
|
|
20 |
An Interactive Diffie-Hellman Problem and Its Application to Identification Scheme
Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.19, no.6, pp.195-199,
|
|