|
1 |
A Fault Injection Attack on Stream Cipher A5/3
Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.3-10,
|
|
2 |
The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6
Park, Chang-Seop;Kang, Hyun-Sun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.11-24,
|
|
3 |
Security Weaknesses of Handover Key Management in 3GPP LTE Network
Han, Chan-Kyu;Choi, Hyoung-Kee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.25-31,
|
|
4 |
Improved Differential Fault Analysis on Block Cipher PRESENT-80/128
Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.33-41,
|
|
5 |
A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks
Choi, Dong-Min;Shin, Jian;Chung, Il-Yong;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.43-56,
|
|
6 |
Carving deleted voice data in mobile
Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.57-65,
|
|
7 |
Research on Efficient Live Evidence Analysis System Based on User Activity Using Android Logging System
Hong, Il-Young;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.67-80,
|
|
8 |
A Study on the Multiplexing of a Communication Line for the Physical Load Balancing-Based Prevention of Infringement
Choi, Hee-Sik;Seo, Woo-Seok;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.81-91,
|
|
9 |
A Study of Stable Intrusion Detection for MANET
Yang, Hwan-Seok;Yang, Jeong-Mo;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.93-98,
|
|
10 |
Privacy Leakage Monitoring System Design for Privacy Protection
Cho, Sung-Kyu;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.99-106,
|
|
11 |
A Study on the Effective Countermeasures for Preventing Computer Security Incidents
Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.107-115,
|
|
12 |
An Efficient Mixnet for Electronic Voting Systems
Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.117-130,
|
|
13 |
A Cloud Storage Gateway to Guarantee the Confidentiality of User Data
Kim, Hong-Sung;Kim, Hyong-Shik;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.131-139,
|
|
14 |
A Study on Operating the IaaS Cloud Computing in view of Integrated Security Management System
Choi, Ju-Young;Park, Choon-Sik;Kim, Myuhng-Joo;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.141-153,
|
|
15 |
Information Security Management System on Cloud Computing Service
Shin, Kyoung-A;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.1, pp.155-167,
|
|