|
1 |
Secure Searchable Encryption with User-Revocability in Multi-User Settings
Kim, Dong-Min;Chun, Ji-Young;Noh, Geon-Tae;Jeong, Ik-Rae;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.3-14,
|
|
2 |
Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability
Kim, Tha-Hyung;Lee, Jun-Ho;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.15-26,
|
|
3 |
A Hybrid Multiple Pattern Matching Scheme to Reduce Packet Inspection Time
Lee, Jae-Kook;Kim, Hyong-Shik;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.27-37,
|
|
4 |
A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention
Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.39-52,
|
|
5 |
Implementation of Privacy Protection Policy Language and Module For Social Network Services
Kim, Ji-Hye;Lee, Hyung-Hyo;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.53-63,
|
|
6 |
Security Analysis of KS X 4600-1 / ISO IEC 12139-1
Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.65-75,
|
|
7 |
On the Security of S3PAS against Intersection Attack
Shin, Dong-Oh;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.77-84,
|
|
8 |
Implementation of a face detection algorithm for the identification of persons
Cho, Mi-Nam;Ji, Yoo-Kang;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.85-91,
|
|
9 |
Secure Contents Access Control System in IPTV Flexible-PPC Model
Kang, Yong-Goo;Lim, Ji-Hwan;Oh, Hee-Kuck;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.93-104,
|
|
10 |
A Study on DCAS Security Framework Model for Mobile IPTV
Choi, Jung-Young;Cho, Kwan-Tae;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.105-116,
|
|
11 |
A study of various attacks on the HB++ protocol for RFID
Shin, Soo-Yeon;Kwon, Tae-Kyoung;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.117-123,
|
|
12 |
Prohibiting internal data leakage to mass storage device in mobile device
Chung, Bo-Heung;Kim, Jung-Nyu;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.125-133,
|
|
13 |
User authentication using touch positions in a touch-screen interface
Kim, Jin-Bok;Lee, Mun-Kyu;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.135-141,
|
|
14 |
A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List
Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.143-151,
|
|
15 |
A novel power trace aligning method for power analysis attacks in mobile devices
Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.153-166,
|
|
16 |
Collection and Analysis of the Digital Evidence for Android and iOS Smart Phones
Goo, Bon-Min;Kim, Ju-Young;Lee, Tae-Rim;Shin, Sang-Uk;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.167-175,
|
|
17 |
The study on a threat countermeasure of mobile cloud services
Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.177-186,
|
|
18 |
Password Authentication and Transaction Confirmation Method Using Secret Puzzle on Mobile Banking
Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.187-199,
|
|
19 |
Enhancing Mobile Platform Security with Virtualization Technologies
Kim, Jung-Han;Kim, Jee-Hong;Shin, Eun-Hwan;Eom, Young-Ik;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.201-212,
|
|
20 |
Android Application Analysis Method for Malicious Activity Detection
Sim, Won-Tae;Kim, Jong-Myoung;Ryou, Jae-Cheol;Noh, Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.21, no.1, pp.213-219,
|
|