Browse > Article List

논문
1 Secure Searchable Encryption with User-Revocability in Multi-User Settings
Kim, Dong-Min;Chun, Ji-Young;Noh, Geon-Tae;Jeong, Ik-Rae; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.3-14,
2 Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability
Kim, Tha-Hyung;Lee, Jun-Ho;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.15-26,
3 A Hybrid Multiple Pattern Matching Scheme to Reduce Packet Inspection Time
Lee, Jae-Kook;Kim, Hyong-Shik; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.27-37,
4 A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention
Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.39-52,
5 Implementation of Privacy Protection Policy Language and Module For Social Network Services
Kim, Ji-Hye;Lee, Hyung-Hyo; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.53-63,
6 Security Analysis of KS X 4600-1 / ISO IEC 12139-1
Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.65-75,
7 On the Security of S3PAS against Intersection Attack
Shin, Dong-Oh;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.77-84,
8 Implementation of a face detection algorithm for the identification of persons
Cho, Mi-Nam;Ji, Yoo-Kang; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.85-91,
9 Secure Contents Access Control System in IPTV Flexible-PPC Model
Kang, Yong-Goo;Lim, Ji-Hwan;Oh, Hee-Kuck; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.93-104,
10 A Study on DCAS Security Framework Model for Mobile IPTV
Choi, Jung-Young;Cho, Kwan-Tae;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.105-116,
11 A study of various attacks on the HB++ protocol for RFID
Shin, Soo-Yeon;Kwon, Tae-Kyoung; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.117-123,
12 Prohibiting internal data leakage to mass storage device in mobile device
Chung, Bo-Heung;Kim, Jung-Nyu; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.125-133,
13 User authentication using touch positions in a touch-screen interface
Kim, Jin-Bok;Lee, Mun-Kyu; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.135-141,
14 A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List
Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.143-151,
15 A novel power trace aligning method for power analysis attacks in mobile devices
Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.153-166,
16 Collection and Analysis of the Digital Evidence for Android and iOS Smart Phones
Goo, Bon-Min;Kim, Ju-Young;Lee, Tae-Rim;Shin, Sang-Uk; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.167-175,
17 The study on a threat countermeasure of mobile cloud services
Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.177-186,
18 Password Authentication and Transaction Confirmation Method Using Secret Puzzle on Mobile Banking
Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.187-199,
19 Enhancing Mobile Platform Security with Virtualization Technologies
Kim, Jung-Han;Kim, Jee-Hong;Shin, Eun-Hwan;Eom, Young-Ik; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.201-212,
20 Android Application Analysis Method for Malicious Activity Detection
Sim, Won-Tae;Kim, Jong-Myoung;Ryou, Jae-Cheol;Noh, Bong-Nam; / Korea Institute of Information Security and Cryptology , v.21, no.1, pp.213-219,