Browse > Article List

논문
1 A Fault Injection Attack on Stream Cipher A5/3
Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.3-10,
2 The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6
Park, Chang-Seop;Kang, Hyun-Sun; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.11-24,
3 Security Weaknesses of Handover Key Management in 3GPP LTE Network
Han, Chan-Kyu;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.25-31,
4 Improved Differential Fault Analysis on Block Cipher PRESENT-80/128
Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.33-41,
5 A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks
Choi, Dong-Min;Shin, Jian;Chung, Il-Yong; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.43-56,
6 Carving deleted voice data in mobile
Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.57-65,
7 Research on Efficient Live Evidence Analysis System Based on User Activity Using Android Logging System
Hong, Il-Young;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.67-80,
8 A Study on the Multiplexing of a Communication Line for the Physical Load Balancing-Based Prevention of Infringement
Choi, Hee-Sik;Seo, Woo-Seok;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.81-91,
9 A Study of Stable Intrusion Detection for MANET
Yang, Hwan-Seok;Yang, Jeong-Mo; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.93-98,
10 Privacy Leakage Monitoring System Design for Privacy Protection
Cho, Sung-Kyu;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.99-106,
11 A Study on the Effective Countermeasures for Preventing Computer Security Incidents
Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.107-115,
12 An Efficient Mixnet for Electronic Voting Systems
Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.117-130,
13 A Cloud Storage Gateway to Guarantee the Confidentiality of User Data
Kim, Hong-Sung;Kim, Hyong-Shik; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.131-139,
14 A Study on Operating the IaaS Cloud Computing in view of Integrated Security Management System
Choi, Ju-Young;Park, Choon-Sik;Kim, Myuhng-Joo; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.141-153,
15 Information Security Management System on Cloud Computing Service
Shin, Kyoung-A;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.22, no.1, pp.155-167,