|
1 |
Public Key Encryption with Keyword Search for Restricted Testability
Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.3-10,
|
|
2 |
A Study on Anonymous Authorization based on Short Group Signatures
Shin, Soo-Yeon;Kwon, Tae-Kyoung;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.11-26,
|
|
3 |
Statistical Analysis of High-Order Power Analysis
Kim, Min-Su;Kim, Hee-Seok;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.27-37,
|
|
4 |
A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm
Seo, Woo-Seok;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.39-46,
|
|
5 |
Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis
Seo, Ho-Jin;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.47-60,
|
|
6 |
Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis
Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.61-75,
|
|
7 |
Promising Fields for Promoting Workforce in Knowledge Information Security Sector: A Case of KISA Employment-Contract Master Program
Jun, Hyo-Jung;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.77-87,
|
|
8 |
Research on Mac OS X Physical Memory Analysis
Lee, Kyeong-Sik;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.89-100,
|
|
9 |
A Study on System Tracing User Activities in the Windows Operating System
Jung, Chang-Sung;Kim, Young-Chan;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.101-114,
|
|
10 |
e-Passport Security Technology using Biometric Information Watermarking
Lee, Yong-Joon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.115-124,
|
|
11 |
A Study on the Implementation of outdoor type Virtual Private Network Gateway for Smart Grid
Park, Jun-Young;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.125-136,
|
|
12 |
STB Virtualization based Enhanced IPTV User Authentication System
Go, Woong;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.137-147,
|
|
13 |
Hash chain based Group Key Management Mechanism for Smart Grid Environments
Eun, Sun-Ki;Oh, Soo-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.149-160,
|
|
14 |
CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks
Kim, Hyun-Gon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.4, pp.161-169,
|
|