Browse > Article List

논문
1 A Secure RFID Multi-Tag Search Protocol Without On-line Server
Lee, Jae-Dong; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.405-415,
2 An Efficient Mixnet for Electronic Voting Systems
Jeon, Woong-Ryul;Lee, Yun-Ho;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.417-425,
3 Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem
Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.427-438,
4 A Late-Round Reduction Attack on the AES Encryption Algorithm Using Fault Injection
Choi, Doo-Sik;Choi, Yong-Je;Choi, Doo-Ho;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.439-445,
5 An efficient privacy-preserving data sharing scheme in social network
Jeon, Doo-Hyun;Chun, Ji-Young;Jeong, Ik-Rae; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.447-461,
6 Efficient and Secure User Authentication and SDP Encryption Method in SIP
Kim, Jung-Je;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.463-472,
7 On the Security of a New C2C-PAKA Protocol
Byun, Jin-Wook; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.473-483,
8 A Differential Fault Attack against Block Cipher HIGHT
Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hee; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.485-494,
9 Speed-optimized Implementation of HIGHT Block Cipher Algorithm
Baek, Eun-Tae;Lee, Mun-Kyu; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.495-504,
10 Efficient Hop-based Access Control for Private Social Networks
Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.505-514,
11 A new digital signature scheme secure against fault attacks
Kim, Tae-Won;Kim, Tae-Hyun;Hong, Seok-Hie;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.515-524,
12 Separate Networks and an Authentication Framework in AMI for Secure Smart Grid
Choi, Jae-Duck;Seo, Jung-Taek; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.525-536,
13 The Mobile Security Diagnostic System against Smart-phone Threat
Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.537-544,
14 A New Method to Detect Anomalous State of Network using Information of Clusters
Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.545-552,
15 Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security
Kang, Koo-Hong;Kang, Dong-Ho;Nah, Jung-Chan;Kim, Ik-Kyun; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.553-564,
16 Research of organized data extraction method for digital investigation in relational database system
Lee, Dong-Chan;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.565-573,
17 A study on method of setting up the defense integrated security system
Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.575-584,
18 Detecting gold-farmers' group in MMORPG by analyzing connection pattern
Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.585-600,
19 A Web application vulnerability scoring framework by categorizing vulnerabilities according to privilege acquisition
Cho, Sung-Young;Yoo, Su-Yeon;Jeon, Sang-Hun;Lim, Chae-Ho;Kim, Se-Hun; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.601-613,
20 Reverse engineering of data abstractions on fragmented binary code
Lee, Jong-Hyup; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.615-619,
21 Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database
Park, Hyun-A;Lee, Dong-Hoon;Chung, Taik-Yeong; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.621-635,
22 A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information
Park, Sung-Ju;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.637-644,
23 A Study on adopting cloud computing in the military
Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.645-654,
24 Security analysis on the Gu-Xue improved secret handshakes scheme
Youn, Taek-Young;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.655-658,
25 A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization
Shin, Seung-Hun;Jung, Man-Hyun;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.659-666,
26 Design and Implementation of Web-browser based Malicious behavior Detection System(WMDS)
Lee, Young-Wook;Jung, Dong-Jae;Jeon, Sang-Hun;Lim, Chae-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.667-677,
27 The Design of Anti-DDoS System using Defense on Depth
Seo, Jin-Won;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.679-689,
28 Hiding Shellcode in the 24Bit BMP Image
Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.22, no.3, pp.691-705,