Browse > Article List

논문
1 Considering Barrier Overhead in Parallelizing AES-CCM
Chung, Yong-Wha;Kim, Sang-Choon; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.3-9,
2 Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System
Bae, Ki-Seok;Park, Jea-Hoon;Sohn, Gyo-Yong;Ha, Jae-Cheol;Moon, Sang-Jae; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.11-25,
3 Power Analysis Attacks on the Stream Cipher Rabbit
Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.27-35,
4 Selection of Detection Measure using Traffic Analysis of Each Malicious Botnet
Jang, Dae-Il;Kim, Min-Soo;Jung, Hyun-Chul;Noh, Bong-Nam; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.37-44,
5 Detect H1TP Tunnels Using Support Vector Machines
He, Dengke;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.45-56,
6 A WLAN Pre-Authentication Scheme Based on Fast Channel Switching for 3G-WLAN Interworking
Baek, Jae-Jong;Kim, Hyo-Jin;Song, Joo-Seok; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.57-66,
7 An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach
Eom, Jung-Ho; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.67-74,
8 Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks
NamGoong, Wan;Cho, Kwan-Tae;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.75-88,
9 A Study on Minimizing Infection of Web-based Malware through Distributed & Dynamic Detection Method of Malicious Websites
Shin, Hwa-Su;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.89-100,
10 Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap
Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.101-115,
11 A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA
Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.117-130,
12 A Study on Contents Sharing Mechanism based on Proxy Re-Encryption Scheme using the Smart Card
Park, Seung-Hwan;Koo, Woo-Kwon;Kim, Ki-Tak;Mun, Hye-Ran;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.131-141,
13 The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database
Jeon, Sang-Jun;Byun, Keun-Duck;Bang, Je-Wan;Lee, Guen-Gi;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.143-154,
14 A Study on Notary System for Web Postings Digital Evidences
Kim, Ah-Reum;Kim, Yeog;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.155-163,
15 Reliability Verification of Evidence Analysis Tools for Digital Forensics
Lee, Tae-Rim;Shin, Sang-Uk; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.165-176,
16 Analysis on a New Intrinsic Vulnerability to Keyboard Security
Lee, Kyung-Roul;Yim, Kang-Bin; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.177-182,
17 Encryption of MPEG using Error Propagation by a Receiver
Jeong, Seo-Hyun;Lee, Sung-Ju;Chung, Young-Wha;Kim, Sang-Chun;Min, Byoung-Ki; / Korea Institute of Information Security and Cryptology , v.21, no.3, pp.183-188,