Browse > Article List

논문
1 A Consideration on Verification and Extension of Fermat's Factorization
Jung, Seo-Hyun;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.3-8,
2 One-Time Virtual Card Number Generation & Transaction Protocol using Integrated Authentication Center
Seo, Seung-Hyun; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.9-21,
3 Maximizing WSQ Compression Rate by Considering Fingerprint Image Quality
Hong, Seung-Woo;Lee, Sung-Ju;Chung, Yong-Wha;Choi, Woo-Yong;Moon, Dae-Sung;Moon, Ki-Young;Jin, Chang-Long;Kim, Hak-Il; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.23-30,
4 An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment
Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.31-41,
5 Incentive Mechanism based on Game Theory in Kad Network
Wang, Xu;Ni, Yongqing;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.43-52,
6 Proposal of a Mutual Authentication and Key Management Scheme based on SRP protocol
Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.53-65,
7 A Lightweight Key Agreement Protocol between Smartcard and Set-Top Box for Secure Communication in IPTV Broadcasting
Lee, Hoon-Jung;Son, Jung-Gap;Oh, Hee-Kuck; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.67-78,
8 Timestamp Analysis of Windows File Systems by File Manipulation Operations
Bang, Je-Wan;Yoo, Byeong-Yeong;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.79-91,
9 Shoulder-Surfing Resistant Password Input Method for Mobile Environment
Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.93-104,
10 Practical Privacy-Preserving DBSCAN Clustering Over Horizontally Partitioned Data
Kim, Gi-Sung;Jeong, Ik-Rae; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.105-111,
11 Secure and Energy-Efficient MPEG Encoding using Multicore Platforms
Lee, Sung-Ju;Lee, Eun-Ji;Hong, Seung-Woo;Choi, Han-Na;Chung, Yong-Wha; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.113-120,
12 State of Art on Security Protocols for Fast Mobile IPv6
You, Il-Sun;Hori, Yoshiaki;Sakurai, Kouichi; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.121-134,
13 Chosen Message Attack on the RSA-CRT Countermeasure Based on Fault Propagation Method
Baek, Yi-Roo;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.20, no.3, pp.135-140,