|
1 |
Cryptanalysis on Two Recent Group Signature Schemes
Ha, Deng-Ke;Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.3-10,
|
|
2 |
Low Space Complexity Bit-Parallel Shifted Polynomial Basis Multipliers using Irreducible Trinomials
Chang, Nam-Su;Kim, Chang-Han;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.11-22,
|
|
3 |
Identity-Based Online/Offline Signcryption Without Random Oracles
Park, Seung-Hwan;Kim, Ki-Tak;Koo, Woo-Kwon;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.23-36,
|
|
4 |
Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof
Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.37-48,
|
|
5 |
An Efficient DSA Signature Scheme Resistant to the Fault Analysis Attack
Bae, Ki-Seok;Baek, Yi-Roo;Moon, Sang-Jae;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.49-57,
|
|
6 |
An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider
Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.59-67,
|
|
7 |
Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments
Kim, Tae-Hyoung;Kim, In-Hyuk;Kim, Jung-Han;Min, Chang-Woo;Kim, Jee-Hong;Eom, Young-Ik;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.69-79,
|
|
8 |
Weaknesses of the new design of wearable token system proposed by Sun et al.
Kim, Jung-Yoon;Choi, Hyoung-Kee;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.81-88,
|
|
9 |
DoS attack prevention using methods for reduction of memory usage in 802.11i 4-Way Handshake
Kim, Jung-Yoon;Kim, In-Hwan;Choi, Hyoung-Kee;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.89-98,
|
|
10 |
Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services
Lee, Tai-Jin;Im, Chae-Su;Im, Chae-Tae;Jung, Hyun-Chul;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.99-110,
|
|
11 |
A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA
Jeon, Jae-Woo;Lim, Sun-Hee;Yi, Ok-Yeon;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.111-124,
|
|
12 |
A Method for Tracing Internet Usage in Multi-use Web browser Environment and Non-English Speaking Countries
Lee, Seung-Bong;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.125-132,
|
|
13 |
Combining Feature Fusion and Decision Fusion in Multimodal Biometric Authentication
Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.20, no.5, pp.133-138,
|
|