|
1 |
Considering Barrier Overhead in Parallelizing AES-CCM
Chung, Yong-Wha;Kim, Sang-Choon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.3-9,
|
|
2 |
Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System
Bae, Ki-Seok;Park, Jea-Hoon;Sohn, Gyo-Yong;Ha, Jae-Cheol;Moon, Sang-Jae;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.11-25,
|
|
3 |
Power Analysis Attacks on the Stream Cipher Rabbit
Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.27-35,
|
|
4 |
Selection of Detection Measure using Traffic Analysis of Each Malicious Botnet
Jang, Dae-Il;Kim, Min-Soo;Jung, Hyun-Chul;Noh, Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.37-44,
|
|
5 |
Detect H1TP Tunnels Using Support Vector Machines
He, Dengke;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.45-56,
|
|
6 |
A WLAN Pre-Authentication Scheme Based on Fast Channel Switching for 3G-WLAN Interworking
Baek, Jae-Jong;Kim, Hyo-Jin;Song, Joo-Seok;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.57-66,
|
|
7 |
An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach
Eom, Jung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.67-74,
|
|
8 |
Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks
NamGoong, Wan;Cho, Kwan-Tae;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.75-88,
|
|
9 |
A Study on Minimizing Infection of Web-based Malware through Distributed & Dynamic Detection Method of Malicious Websites
Shin, Hwa-Su;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.89-100,
|
|
10 |
Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap
Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.101-115,
|
|
11 |
A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA
Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.117-130,
|
|
12 |
A Study on Contents Sharing Mechanism based on Proxy Re-Encryption Scheme using the Smart Card
Park, Seung-Hwan;Koo, Woo-Kwon;Kim, Ki-Tak;Mun, Hye-Ran;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.131-141,
|
|
13 |
The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database
Jeon, Sang-Jun;Byun, Keun-Duck;Bang, Je-Wan;Lee, Guen-Gi;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.143-154,
|
|
14 |
A Study on Notary System for Web Postings Digital Evidences
Kim, Ah-Reum;Kim, Yeog;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.155-163,
|
|
15 |
Reliability Verification of Evidence Analysis Tools for Digital Forensics
Lee, Tae-Rim;Shin, Sang-Uk;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.165-176,
|
|
16 |
Analysis on a New Intrinsic Vulnerability to Keyboard Security
Lee, Kyung-Roul;Yim, Kang-Bin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.177-182,
|
|
17 |
Encryption of MPEG using Error Propagation by a Receiver
Jeong, Seo-Hyun;Lee, Sung-Ju;Chung, Young-Wha;Kim, Sang-Chun;Min, Byoung-Ki;
/
Korea Institute of Information Security and Cryptology
, v.21, no.3, pp.183-188,
|
|