|
1 |
A Secure RFID Multi-Tag Search Protocol Without On-line Server
Lee, Jae-Dong;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.405-415,
|
|
2 |
An Efficient Mixnet for Electronic Voting Systems
Jeon, Woong-Ryul;Lee, Yun-Ho;Won, Dong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.417-425,
|
|
3 |
Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem
Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.427-438,
|
|
4 |
A Late-Round Reduction Attack on the AES Encryption Algorithm Using Fault Injection
Choi, Doo-Sik;Choi, Yong-Je;Choi, Doo-Ho;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.439-445,
|
|
5 |
An efficient privacy-preserving data sharing scheme in social network
Jeon, Doo-Hyun;Chun, Ji-Young;Jeong, Ik-Rae;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.447-461,
|
|
6 |
Efficient and Secure User Authentication and SDP Encryption Method in SIP
Kim, Jung-Je;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.463-472,
|
|
7 |
On the Security of a New C2C-PAKA Protocol
Byun, Jin-Wook;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.473-483,
|
|
8 |
A Differential Fault Attack against Block Cipher HIGHT
Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.485-494,
|
|
9 |
Speed-optimized Implementation of HIGHT Block Cipher Algorithm
Baek, Eun-Tae;Lee, Mun-Kyu;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.495-504,
|
|
10 |
Efficient Hop-based Access Control for Private Social Networks
Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.505-514,
|
|
11 |
A new digital signature scheme secure against fault attacks
Kim, Tae-Won;Kim, Tae-Hyun;Hong, Seok-Hie;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.515-524,
|
|
12 |
Separate Networks and an Authentication Framework in AMI for Secure Smart Grid
Choi, Jae-Duck;Seo, Jung-Taek;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.525-536,
|
|
13 |
The Mobile Security Diagnostic System against Smart-phone Threat
Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.537-544,
|
|
14 |
A New Method to Detect Anomalous State of Network using Information of Clusters
Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.545-552,
|
|
15 |
Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security
Kang, Koo-Hong;Kang, Dong-Ho;Nah, Jung-Chan;Kim, Ik-Kyun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.553-564,
|
|
16 |
Research of organized data extraction method for digital investigation in relational database system
Lee, Dong-Chan;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.565-573,
|
|
17 |
A study on method of setting up the defense integrated security system
Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.575-584,
|
|
18 |
Detecting gold-farmers' group in MMORPG by analyzing connection pattern
Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.585-600,
|
|
19 |
A Web application vulnerability scoring framework by categorizing vulnerabilities according to privilege acquisition
Cho, Sung-Young;Yoo, Su-Yeon;Jeon, Sang-Hun;Lim, Chae-Ho;Kim, Se-Hun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.601-613,
|
|
20 |
Reverse engineering of data abstractions on fragmented binary code
Lee, Jong-Hyup;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.615-619,
|
|
21 |
Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database
Park, Hyun-A;Lee, Dong-Hoon;Chung, Taik-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.621-635,
|
|
22 |
A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information
Park, Sung-Ju;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.637-644,
|
|
23 |
A Study on adopting cloud computing in the military
Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.645-654,
|
|
24 |
Security analysis on the Gu-Xue improved secret handshakes scheme
Youn, Taek-Young;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.655-658,
|
|
25 |
A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization
Shin, Seung-Hun;Jung, Man-Hyun;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.659-666,
|
|
26 |
Design and Implementation of Web-browser based Malicious behavior Detection System(WMDS)
Lee, Young-Wook;Jung, Dong-Jae;Jeon, Sang-Hun;Lim, Chae-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.667-677,
|
|
27 |
The Design of Anti-DDoS System using Defense on Depth
Seo, Jin-Won;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.679-689,
|
|
28 |
Hiding Shellcode in the 24Bit BMP Image
Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.22, no.3, pp.691-705,
|
|