Browse > Article List

논문
1 An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement
Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.709-717,
2 Network Forensic Evidence Generation and Verification Scheme
Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.719-731,
3 The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption
Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.733-744,
4 Secure Key Distribution Protocol for ZigBee Wireless Sensor Network
Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.745-759,
5 On the Security of Image-based CAPTCHA using Multi-image Composition
Byun, Je-Sung;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.761-770,
6 Video Data Collection Scheme From Vehicle Black Box Using Time and Location Information for Public Safety
Choi, Jae-Duck;Chae, Kang-Suk;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.771-783,
7 Malicious Code Detection using the Effective Preprocessing Method Based on Native API
Bae, Seong-Jae;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.785-796,
8 Decision Support System to Detect Unauthorized Access in Smart Work Environment
Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.797-808,
9 Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control
Lee, Dae-Seob;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.809-817,
10 Real-time Phishing Site Detection Method
Sa, Joon-Ho;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.819-825,
11 Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones
Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.827-839,
12 User Authentication Protocol through Distributed Process for Cloud Environment
Jeong, Yoon-Su;Lee, Sang-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.841-849,
13 A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis
Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.851-868,
14 An Enhanced method for detecting obfuscated Javascript Malware using automated Deobfuscation
Ji, Sun-Ho;Kim, Huy-Kang; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.869-882,
15 A Study on Information Security Policy in the era of Smart Society
Kim, Dong-Wook;Sung, Wook-Joon; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.883-899,
16 A Study on Self Assessment of Mobile Secure Coding
Kim, Dong-Won;Han, Keun-Hee; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.901-911,
17 A Study of Patient's Privacy Protection in U-Healthcare
Jeong, Yoon-Su;Lee, Sang-Ho; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.913-921,
18 Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations -
Jeong, Dae-Kyeong; / Korea Institute of Information Security and Cryptology , v.22, no.4, pp.923-939,