Browse > Article List

논문
1 Cryptanalysis on Two Recent Group Signature Schemes
Ha, Deng-Ke;Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.3-10,
2 Low Space Complexity Bit-Parallel Shifted Polynomial Basis Multipliers using Irreducible Trinomials
Chang, Nam-Su;Kim, Chang-Han; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.11-22,
3 Identity-Based Online/Offline Signcryption Without Random Oracles
Park, Seung-Hwan;Kim, Ki-Tak;Koo, Woo-Kwon;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.23-36,
4 Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof
Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.37-48,
5 An Efficient DSA Signature Scheme Resistant to the Fault Analysis Attack
Bae, Ki-Seok;Baek, Yi-Roo;Moon, Sang-Jae;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.49-57,
6 An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider
Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.59-67,
7 Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments
Kim, Tae-Hyoung;Kim, In-Hyuk;Kim, Jung-Han;Min, Chang-Woo;Kim, Jee-Hong;Eom, Young-Ik; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.69-79,
8 Weaknesses of the new design of wearable token system proposed by Sun et al.
Kim, Jung-Yoon;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.81-88,
9 DoS attack prevention using methods for reduction of memory usage in 802.11i 4-Way Handshake
Kim, Jung-Yoon;Kim, In-Hwan;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.89-98,
10 Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services
Lee, Tai-Jin;Im, Chae-Su;Im, Chae-Tae;Jung, Hyun-Chul; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.99-110,
11 A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA
Jeon, Jae-Woo;Lim, Sun-Hee;Yi, Ok-Yeon; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.111-124,
12 A Method for Tracing Internet Usage in Multi-use Web browser Environment and Non-English Speaking Countries
Lee, Seung-Bong;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.125-132,
13 Combining Feature Fusion and Decision Fusion in Multimodal Biometric Authentication
Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.20, no.5, pp.133-138,