Browse > Article List

논문
1 Public Key Encryption with Keyword Search for Restricted Testability
Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.3-10,
2 A Study on Anonymous Authorization based on Short Group Signatures
Shin, Soo-Yeon;Kwon, Tae-Kyoung; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.11-26,
3 Statistical Analysis of High-Order Power Analysis
Kim, Min-Su;Kim, Hee-Seok;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.27-37,
4 A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm
Seo, Woo-Seok;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.39-46,
5 Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis
Seo, Ho-Jin;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.47-60,
6 Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis
Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.61-75,
7 Promising Fields for Promoting Workforce in Knowledge Information Security Sector: A Case of KISA Employment-Contract Master Program
Jun, Hyo-Jung;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.77-87,
8 Research on Mac OS X Physical Memory Analysis
Lee, Kyeong-Sik;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.89-100,
9 A Study on System Tracing User Activities in the Windows Operating System
Jung, Chang-Sung;Kim, Young-Chan; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.101-114,
10 e-Passport Security Technology using Biometric Information Watermarking
Lee, Yong-Joon; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.115-124,
11 A Study on the Implementation of outdoor type Virtual Private Network Gateway for Smart Grid
Park, Jun-Young;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.125-136,
12 STB Virtualization based Enhanced IPTV User Authentication System
Go, Woong;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.137-147,
13 Hash chain based Group Key Management Mechanism for Smart Grid Environments
Eun, Sun-Ki;Oh, Soo-Hyun; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.149-160,
14 CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks
Kim, Hyun-Gon; / Korea Institute of Information Security and Cryptology , v.21, no.4, pp.161-169,