|
1 |
An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement
Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.709-717,
|
|
2 |
Network Forensic Evidence Generation and Verification Scheme
Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.719-731,
|
|
3 |
The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption
Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.733-744,
|
|
4 |
Secure Key Distribution Protocol for ZigBee Wireless Sensor Network
Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.745-759,
|
|
5 |
On the Security of Image-based CAPTCHA using Multi-image Composition
Byun, Je-Sung;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.761-770,
|
|
6 |
Video Data Collection Scheme From Vehicle Black Box Using Time and Location Information for Public Safety
Choi, Jae-Duck;Chae, Kang-Suk;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.771-783,
|
|
7 |
Malicious Code Detection using the Effective Preprocessing Method Based on Native API
Bae, Seong-Jae;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.785-796,
|
|
8 |
Decision Support System to Detect Unauthorized Access in Smart Work Environment
Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.797-808,
|
|
9 |
Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control
Lee, Dae-Seob;Won, Dong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.809-817,
|
|
10 |
Real-time Phishing Site Detection Method
Sa, Joon-Ho;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.819-825,
|
|
11 |
Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones
Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.827-839,
|
|
12 |
User Authentication Protocol through Distributed Process for Cloud Environment
Jeong, Yoon-Su;Lee, Sang-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.841-849,
|
|
13 |
A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis
Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.851-868,
|
|
14 |
An Enhanced method for detecting obfuscated Javascript Malware using automated Deobfuscation
Ji, Sun-Ho;Kim, Huy-Kang;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.869-882,
|
|
15 |
A Study on Information Security Policy in the era of Smart Society
Kim, Dong-Wook;Sung, Wook-Joon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.883-899,
|
|
16 |
A Study on Self Assessment of Mobile Secure Coding
Kim, Dong-Won;Han, Keun-Hee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.901-911,
|
|
17 |
A Study of Patient's Privacy Protection in U-Healthcare
Jeong, Yoon-Su;Lee, Sang-Ho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.913-921,
|
|
18 |
Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations -
Jeong, Dae-Kyeong;
/
Korea Institute of Information Security and Cryptology
, v.22, no.4, pp.923-939,
|
|