|
1 |
A Consideration on Verification and Extension of Fermat's Factorization
Jung, Seo-Hyun;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.3-8,
|
|
2 |
One-Time Virtual Card Number Generation & Transaction Protocol using Integrated Authentication Center
Seo, Seung-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.9-21,
|
|
3 |
Maximizing WSQ Compression Rate by Considering Fingerprint Image Quality
Hong, Seung-Woo;Lee, Sung-Ju;Chung, Yong-Wha;Choi, Woo-Yong;Moon, Dae-Sung;Moon, Ki-Young;Jin, Chang-Long;Kim, Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.23-30,
|
|
4 |
An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment
Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.31-41,
|
|
5 |
Incentive Mechanism based on Game Theory in Kad Network
Wang, Xu;Ni, Yongqing;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.43-52,
|
|
6 |
Proposal of a Mutual Authentication and Key Management Scheme based on SRP protocol
Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.53-65,
|
|
7 |
A Lightweight Key Agreement Protocol between Smartcard and Set-Top Box for Secure Communication in IPTV Broadcasting
Lee, Hoon-Jung;Son, Jung-Gap;Oh, Hee-Kuck;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.67-78,
|
|
8 |
Timestamp Analysis of Windows File Systems by File Manipulation Operations
Bang, Je-Wan;Yoo, Byeong-Yeong;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.79-91,
|
|
9 |
Shoulder-Surfing Resistant Password Input Method for Mobile Environment
Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.93-104,
|
|
10 |
Practical Privacy-Preserving DBSCAN Clustering Over Horizontally Partitioned Data
Kim, Gi-Sung;Jeong, Ik-Rae;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.105-111,
|
|
11 |
Secure and Energy-Efficient MPEG Encoding using Multicore Platforms
Lee, Sung-Ju;Lee, Eun-Ji;Hong, Seung-Woo;Choi, Han-Na;Chung, Yong-Wha;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.113-120,
|
|
12 |
State of Art on Security Protocols for Fast Mobile IPv6
You, Il-Sun;Hori, Yoshiaki;Sakurai, Kouichi;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.121-134,
|
|
13 |
Chosen Message Attack on the RSA-CRT Countermeasure Based on Fault Propagation Method
Baek, Yi-Roo;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.20, no.3, pp.135-140,
|
|